Which of the following is an authentication and encryption protocol that works at the Network layer of the OSI seven-layer model?
A. IPSec
B. Secure Sockets Layer (SSL)
C. MS-CHAP
D. Transport Layer Security (TLS)
Answer: A
You might also like to view...
Which answer below is the result of assignments of responsibility, which assist a company in judging performance?
A. Accountability B. Dependability C. Reliability D. Stability
You change the ____ list box on the validator page to test an XHTML document with another DTD.
A. File B. Encoding C. Doctype D. Root Element
How does polymorphism enable you to program “in the general” rather than “in the spe- cific”? Discuss the key advantages of programming “in the general.”
What will be an ideal response?
The point of origin on an object is the point____.
A. that is locked on the artboard B. from which an object is duplicated C. from which an object is transformed D. cannot be anything other than the center point