Which of the following IPSec protocols manages the exchange of encryption keys?

A) AH
B) ESP
C) IKE
D) None of the above

C) IKE

Computer Science & Information Technology

You might also like to view...

Which of the following types of media connectors carries digital video as well as audio?

A. DVI-D B. DVI-A C. HDMI D. VGA

Computer Science & Information Technology

A new mobile application is being developed in-house. Security reviews did not pick up any major flaws, however vulnerability scanning results show fundamental issues at the very end of the project cycle.Which of the following security activities should also have been performed to discover vulnerabilities earlier in the lifecycle?

A. Architecture review B. Risk assessment C. Protocol analysis D. Code review

Computer Science & Information Technology