Which of the following VPN technologies uses IKE and ISAKMP for key exchange?

A. SSL
B. IPSec
C. L2TP
D. PPTP

Answer: B. IPSec

Computer Science & Information Technology

You might also like to view...

The If Then Else control structure tests if a condition is true

Indicate whether the statement is true or false

Computer Science & Information Technology

Which view is a condensed view of a document that is used in conjunction with styles?

A) Full Screen Reading B) Print Layout C) Outline D) Draft

Computer Science & Information Technology