in Technology by

IPsec defines two protocols: _______ and ________.

       A. PGP; ESP

       B. AH; SSL

       A. PGP; SSL

       B. AH; ESP

1 Answer

0 votes
by

IPsec defines two protocols: _______ and ________.

Ans : AH; ESP

Related questions

0 votes
    In computer security _______ means that the information in a computer system only be accessible for reading by ... . integrity B. confidentiality C. authenticity D. availability...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which of the following organizations is primarily concerned with military encryption systems? A. NIST B. NSA C. ITU D. IEEE...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    ______ provides authentication at the IP level. A. ESP B. AH C. SSL D. PGP...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    NiFi allows stable exchange through the use of protocols which have ________ encryption. (1)None of the options (2)All the options (3)2-way-ssl (4)1-way-ssl...
asked Apr 20, 2021 in Technology by JackTerrance
0 votes
    There are ________ types of VPN protocols. (a) 3 (b) 4 (c) 5 (d) 6 This question was addressed to me ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    ________ attribute defines the size of the font from values 1to7 Select the correct answer from above options...
asked Nov 27, 2021 in Education by JackTerrance
0 votes
    5. Which key defines a relationship between two tables? (a) Primary key (b) Foreign key (b) Secondary key (d) ... Full form of RDBMS is Select the correct answer from above options...
asked Dec 21, 2021 in Education by JackTerrance
0 votes
    HTTP defines two ways in which values entered by a user at the browser can be sent to the Web ... Answers, Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    Q.2 Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN? A. ESP ... AH transport mode C. AH tunnel mode D. ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    Which of the following are the port numbers for IPSec service? (a) 50, 51 (b) 49, 50 (c) 51, 52 (d) ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    What does IPsec in the Azure platform refer to? a) Internet Protocol Security protocol suite b) Internet Standard c) Commodity servers d) All of the mentioned...
asked Dec 23, 2020 by JackTerrance
0 votes
    The _______ and ________ of a discrete random variable is easy to compute at the console. (a) Mean, Variance ... of R Programming Select the correct answer from above options...
asked Feb 9, 2022 in Education by JackTerrance
0 votes
    Network administrators can create their own ACL rules based on _______ ________ and _______ (a) Address, Protocols and ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
...