In IPsec, authentication is accomplished by the ____ protocol.

A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP

Answer: C

Computer Science & Information Technology

You might also like to view...

Most photo-sharing websites make money by selling other photo-related services

Indicate whether the statement is true or false

Computer Science & Information Technology

If Word has set the linked to previous option as default, you need to unlink headers and footers if you want to change it for the current section

Indicate whether the statement is true or false

Computer Science & Information Technology