Multiple Choice
For each transaction, IPSec uses the ____ to negotiate security protocols each IPSec peer will use for communicating and constructing data transactions.
A) IGMP
B) Internet Key Exchange
C) UDP
D) L2TP
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q27: _ provides hard drive-based encryption of servers
Q28: All forms of NTLM use the _.<br>A)challenge-response
Q29: With _, each user has a public
Q31: A _ is a microchip that performs
Q32: _ attacks are performed by flooding a
Q33: A(n)_ attack involves placing a computer between
Q34: Using BitLocker with a TPM and a
Q35: Windows Server 2008 has two tools for
Q35: IPSec's _ provides end-to-end security between devices
Q39: EFS uses a combination of private and