Which Authentication Encryption approach is taken by the IPSec protocol?
(c).Encryption followed by authentication (E→A)
total answers (1)
start bookmarking useful questions and collections and save it into your own study-lists, login now to start creating your own collections.
(c).Encryption followed by authentication (E→A)
need an explanation for this answer? contact us directly to get an explanation for this answer