When two parties in an IPsec connection communicate back and forth, there are ________ security associations

A) 1
B) 2
C) 3
D) 4

Answer: B

Business

You might also like to view...

Describe the type of checking account you have or plan to have. List the advantages and disadvantages of your choice

What will be an ideal response?

Business

The principles that should be followed for personnel security are: limited reliance on key employees, separation of duties, and _______

What will be an ideal response?

Business