List two reasons IPsec has become the standard set of protocols for VPN security.

What will be an ideal response?


IPsec works at Layer 3 and provides a type of security that is not available with protocols that work at Layer 2.
IPsec can encrypt an entire TCP/IP packet instead of just the data portion, as with other protocols.
IPsec was originally developed for use with IPv6, although it can also work with IPv4.
IPsec provides authentication of source and destination computers before data is encrypted or transmitted.

Computer Science & Information Technology

You might also like to view...

Why have we not needed to overload the assignment operator so far?

What will be an ideal response?

Computer Science & Information Technology

________effects can be created using pseudo-classes.

A. Cascading B. Rollover C. Hover D. Link

Computer Science & Information Technology

A(n) ________ is when the field only depends on one part of a composite or concatenated key

A) determinate B) transitive dependency C) partial dependency D) atomic record

Computer Science & Information Technology

Trojans can perform which of the following actions?

a. Delete files on the computer. b. Launch a DoS attach. c. Open a backdoor. d. All the above.

Computer Science & Information Technology