When two parties in an IPsec connection communicate back and forth, there are ________ security associations
A) 1
B) 2
C) 3
D) 4
Answer: B
Business
You might also like to view...
Describe the type of checking account you have or plan to have. List the advantages and disadvantages of your choice
What will be an ideal response?
Business
The principles that should be followed for personnel security are: limited reliance on key employees, separation of duties, and _______
What will be an ideal response?
Business