In IPsec, authentication is accomplished by the ____ protocol.
A. Encapsulating Security Payload (ESP)
B. ISAKMP/Oakley
C. Authentication Header (AH)
D. L2TP
Answer: C
Computer Science & Information Technology
You might also like to view...
Most photo-sharing websites make money by selling other photo-related services
Indicate whether the statement is true or false
Computer Science & Information Technology
If Word has set the linked to previous option as default, you need to unlink headers and footers if you want to change it for the current section
Indicate whether the statement is true or false
Computer Science & Information Technology