In IPsec, confidentiality is achieved through the ____protocol.
A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP
Answer: A
You might also like to view...
Overload the average method of Exercise 5.22 to accept four integer parameters and return their average.
What will be an ideal response?
Approximately ________ of the population are visual learners who often think in pictures
A) 80% B) 65% C) 50% D) 95%
10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.
Answer the following statement true (T) or false (F)
Match each item with a statement below.
A. A program or class that instantiates objects of another prewritten class. B. A definition containing an optional access modifier, the keyword class, and an identifier. C. A type that refers to a specific memory location. D. This allows assignment of values to fields using a property name. E. This retrieves an object's field values. F. Identifiers that act like keywords in specific circumstances. G. An alternative to repeating code in the constructors. H. An automatically generated constructor for a class. I. The value of an object initialized with a default constructor. J. A property that has only a get accessor, and no set accessor.