IKEv2 requires the use of which of authentication protocol?

A. Password Authentication Protocol (PAP)
B. Challenge Handshake Protocol (CHAP)
C. Point-to-Point Protocol (PPP)
D. Extensible Authentication Protocol (EAP)


Answer: D

Computer Science & Information Technology

You might also like to view...

A document can be saved as ____________________ text so it can be opened by other word processing software.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Variables declared using a structure as their data type are often referred to as ____ variables.

A. object B. structure C. static D. internal

Computer Science & Information Technology

Aerial shots and very high-angle shots are sometimes called bird's-eye view shots.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ makes it easier to enter repetitive text in cells.

A. Editing mode B. AutoFit C. AutoComplete D. AutoFill

Computer Science & Information Technology