IPsec provides two main functions: a combined authentication/encryption function called ___________ and a key exchange function.
Fill in the blank(s) with the appropriate word(s).
Encapsulating Security Payload (ESP)
Computer Science & Information Technology
You might also like to view...
When the remaining cluster space of a partially filled sector is padded with contents from RAM. What is the name for this type of scenario?
A. Disk slack B. RAM slack C. ROM slack D. Edge slack
Computer Science & Information Technology
A multimedia structure, in which users navigate sequentially, from one frame of information to another, could be called ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology