In IPsec, confidentiality is achieved through the ____protocol.

A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP


Answer: A

Computer Science & Information Technology

You might also like to view...

JavaScript can be described as:

a. an object-based scripting language b. a markup language c. an HTML5 element d. none of the above

Computer Science & Information Technology

The first thing you should focus on when creating a presentation is the ________

A) audience B) content C) design D) slide layout

Computer Science & Information Technology

Memory is organized into cells; each cell has its own unique numeric location identifier, or __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can save changes to a document at any time by clicking the Save button on the Standard toolbar.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology