Skinny Client Control Protocol? Really? That's not even close to being an IPsec protocol. Whoever came up with that option must have been having a bad day.
Hmm, I'm a bit unsure about this one. I know IPsec has some core protocols, but I can't quite recall all the details. I'll go with A and B since those sound familiar, but I'll have to leave C and D as guesses.
Ah, this is a good IPsec question. I'm confident A, B, and D are the right answers since those are the main IPsec protocols we covered. Not sure about C, so I'll leave that one unchecked.
I remember learning about IPsec in class, and I'm pretty sure A, B, and D are the correct protocols it uses. C seems out of place, so I'll skip that one.
I think Encapsulating Security Payload and Authentication Header are definitely part of IPsec, but I need to double-check if Internet Key Exchange is also included.
Okay, I know IPsec uses encryption and authentication, so A and D sound like the right answers. But I'm not familiar with B and C, so I'll have to guess on those.
Hmm, this seems like a pretty straightforward IPsec question. I'll definitely choose A and B, as those are the core IPsec protocols. Not sure about C and D though, I'll have to think that through.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Avery
13 hours agoLayla
6 days agoLeila
11 days agoMaybelle
16 days agoHoney
21 days agoAnnice
26 days agoPauline
1 month agoBenton
1 month agoKassandra
1 month agoLinn
2 months agoStephaine
2 months agoVince
2 months agoRosalind
2 months agoCarolann
2 months agoMakeda
2 months agoReita
3 months agoRessie
3 months agoJean
3 months agoYan
3 months ago