Which of the following IPSec protocols manages the exchange of encryption keys?

a. AH
b. ESP
c. IPComp
d. IKE


ANS: D

Computer Science & Information Technology

You might also like to view...

.dxr files are .cst files that are locked for distribution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why is it safe to ignore validation warnings about deprecated attributes that stem from widgets in a web page?

A. They represent a bug in the validator itself. B. Validation is unimportant. C. The layout of your page does not rely on them. D. It is not safe to ignore these warnings.

Computer Science & Information Technology

Closed paths always have fills.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image?

a. GRUB b. Kickstart c. POST d. Upstart

Computer Science & Information Technology