Which protocol should you implement to protect data that is transmitted over a VPN?
A. SET
B. IPsec
C. SHTTP
D. SFTP
B
Explanation: You should implement Internet Protocol Security (IPsec) to protect data that is transmitted over a VPN.
Computer Science & Information Technology
You might also like to view...
?What are the two most common technologies that provide asymmetric encryption on Linux systems?
A. ?Apache httpd B. ?Secure Shell (SSH) C. ?Telnet D. ?GNU Privacy Guard (GPG)
Computer Science & Information Technology
What should be created in order to begin a digital forensics case?
a. An investigation plan b. A risk assessment report c. An evidence custody list d. An investigation report
Computer Science & Information Technology