In IPsec, key management is accomplished through a protocol known as ____.
A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP
Answer: B
You might also like to view...
You can make changes to the handout master, which determines the layout of elements, such as the header and footer, on the handout pages
Indicate whether the statement is true or false
When creating a form, Access might automatically add a(n) ________ if more than one table is related.
Fill in the blank(s) with the appropriate word(s).
Which of the following activities is part of the risk identification process?
A. determining the likelihood that vulnerable systems will be attacked by specific threats B. calculating the severity of risks to which assets are exposed in their current setting C. assigning a value to each information asset D. documenting and reporting the findings of risk analysis
A(n) ____________________ is the location where the cable comes out of the wall in the workstation.
Fill in the blank(s) with the appropriate word(s).