When an IPsec communication begins between two computers, the computers first exchange ____ to authenticate the receiver and sender.

A. keys
B. certificates
C. passwords
D. tickets

Answer: B

Computer Science & Information Technology

You might also like to view...

As shown in the accompanying figure, XML Schema supports ____ types of content.

A. two B. three C. four D. six

Computer Science & Information Technology

When you create a table like the one in the accompanying figure, Dreamweaver inserts a(n) ____ in each cell.

A. break tag B. nonbreaking space C. hyperlink D. anchor tag

Computer Science & Information Technology