Which of the following IPSec protocols manages the exchange of encryption keys?
a. AH
b. ESP
c. IPComp
d. IKE
ANS: D
Computer Science & Information Technology
You might also like to view...
.dxr files are .cst files that are locked for distribution.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Why is it safe to ignore validation warnings about deprecated attributes that stem from widgets in a web page?
A. They represent a bug in the validator itself. B. Validation is unimportant. C. The layout of your page does not rely on them. D. It is not safe to ignore these warnings.
Computer Science & Information Technology
Closed paths always have fills.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following options can be specified in the GRUB Legacy configuration file to set how long the boot menu is displayed before loading the default image?
a. GRUB b. Kickstart c. POST d. Upstart
Computer Science & Information Technology