IKEv2 requires the use of which of authentication protocol?
A. Password Authentication Protocol (PAP)
B. Challenge Handshake Protocol (CHAP)
C. Point-to-Point Protocol (PPP)
D. Extensible Authentication Protocol (EAP)
Answer: D
Computer Science & Information Technology
You might also like to view...
A document can be saved as ____________________ text so it can be opened by other word processing software.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Variables declared using a structure as their data type are often referred to as ____ variables.
A. object B. structure C. static D. internal
Computer Science & Information Technology
Aerial shots and very high-angle shots are sometimes called bird's-eye view shots.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
____ makes it easier to enter repetitive text in cells.
A. Editing mode B. AutoFit C. AutoComplete D. AutoFill
Computer Science & Information Technology