Multiple Choice
IPSec ____ use a complex set of security protocols to protect information, including Internet Key Exchange (IKE) , which provides for the exchange of security keys between the machines in the VPN.
A) endpoints
B) access points
C) tunnels
D) concentrators
Correct Answer:

Verified
Correct Answer:
Verified
Q30: _ is the act of confirming the
Q31: Which authentication method is used when you
Q32: Some VPNs use the term _ to
Q33: A(n) _ is basically an internal network
Q34: Match each item with a statement below.<br>a.Site-to-site
Q36: _ is the process by which a
Q37: Point-to-Point Protocol (PPP) over Secure Sockets Layer
Q38: Match each item with a statement below.<br>a.Site-to-site
Q39: Most personal computer operating systems use the
Q40: Biometrics (retinal scans, fingerprints, and the like)