Which of the following VPN technologies uses IKE and ISAKMP for key exchange?
A. SSL
B. IPSec
C. L2TP
D. PPTP
Answer: B. IPSec
Computer Science & Information Technology
You might also like to view...
The If Then Else control structure tests if a condition is true
Indicate whether the statement is true or false
Computer Science & Information Technology
Which view is a condensed view of a document that is used in conjunction with styles?
A) Full Screen Reading B) Print Layout C) Outline D) Draft
Computer Science & Information Technology