A security administrator has been asked to implement a VPN that will support remote access over IPSEC.Which of the following is an encryption algorithm that would meet this requirement?

A. MD5
B. AES
C. UDP
D. PKI


Answer: B. AES

Computer Science & Information Technology

You might also like to view...

Breaking up a large problem into smaller subproblems is called .

(A) transcribed refinement (B) refined subtasks (C) stepwise refinement (D) transcribed subtasks

Computer Science & Information Technology

List three reasons an administrator would want to use subnetting.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____ key is the field that contains unique information for each row of Excel table data imported into Access.

A. primary B. secondary C. search D. information

Computer Science & Information Technology

A GPU executes instructions in parallel with the ________, the main processor, and carries out all graphics operations including modeling, motion, rendering, and display.

A. CPU B. NPU C. PGU D. GIPU

Computer Science & Information Technology