In IPsec, confidentiality is achieved through the ____protocol.
A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP
Answer: A
Computer Science & Information Technology
You might also like to view...
JavaScript can be described as:
a. an object-based scripting language b. a markup language c. an HTML5 element d. none of the above
Computer Science & Information Technology
The first thing you should focus on when creating a presentation is the ________
A) audience B) content C) design D) slide layout
Computer Science & Information Technology
Memory is organized into cells; each cell has its own unique numeric location identifier, or __________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
You can save changes to a document at any time by clicking the Save button on the Standard toolbar.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology