In IPsec, authentication is accomplished by the ____ protocol.

A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP


Answer: C

Computer Science & Information Technology

You might also like to view...

The class NumberFormat allows you to specify a constant representing which country’s currency format should be used. To use this constant you must import:

a. java.util.Locale b. java.util.Currency c. java.util.Properties d. None of the above.

Computer Science & Information Technology

In 1973, the developers of UNIX revised it by writing it in assembly language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following methods correctly withdraws an amount from a bank account?

A. Method withdraw(Numeric amt)    acctBal = acctBal - amt    Display "The new balance is: $" + acctBal End Method B. Method withdraw(String amt)    acctBal = acctBal - amt    Display "The new balance is: $" + acctBal End Method C. Method withdraw(Numeric amount)    acctBal = acctBal - amt    Display "The new balance is: $" + acctBal End Method D. Method withdraw(String amount)    acctBal = acctBal - amt    Display "The new balance is: $" + acctBal End Method

Computer Science & Information Technology

The Separations Preview panel is interactive.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology