A security administrator has been asked to implement a VPN that will support remote access over IPSEC.Which of the following is an encryption algorithm that would meet this requirement?
A. MD5
B. AES
C. UDP
D. PKI
Answer: B. AES
Computer Science & Information Technology
You might also like to view...
Breaking up a large problem into smaller subproblems is called .
(A) transcribed refinement (B) refined subtasks (C) stepwise refinement (D) transcribed subtasks
Computer Science & Information Technology
List three reasons an administrator would want to use subnetting.
What will be an ideal response?
Computer Science & Information Technology
A(n) ____ key is the field that contains unique information for each row of Excel table data imported into Access.
A. primary B. secondary C. search D. information
Computer Science & Information Technology
A GPU executes instructions in parallel with the ________, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display.
A. CPU B. NPU C. PGU D. GIPU
Computer Science & Information Technology