In IPsec, key management is accomplished through a protocol known as ____.

A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP


Answer: B

Computer Science & Information Technology

You might also like to view...

You can make changes to the handout master, which determines the layout of elements, such as the header and footer, on the handout pages

Indicate whether the statement is true or false

Computer Science & Information Technology

When creating a form, Access might automatically add a(n) ________ if more than one table is related.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following activities is part of the risk identification process?

A. determining the likelihood that vulnerable systems will be attacked by specific threats B. calculating the severity of risks to which assets are exposed in their current setting C. assigning a value to each information asset D. documenting and reporting the findings of risk analysis

Computer Science & Information Technology

A(n) ____________________ is the location where the cable comes out of the wall in the workstation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology