What is the most appropriate use of IPSec?

A. Processing encryption
B. Storage encryption
C. Data transmission protection
D. Database protection

Answer: C. Data transmission protection

Computer Science & Information Technology

You might also like to view...

Before conducting a security test by using social-engineering tactics, what should you do?

a. Set up an appointment. b. Document all findings. c. Get written permission from the person who hired you to conduct the security test. d. Get written permission from the department head.

Computer Science & Information Technology

Computer scientists use the term __________ to describe the interconnections that link a computer’s components.

a. interface b. bus c. architecture d. none of the above

Computer Science & Information Technology