1answer.
Меню
Ask question
Login
Signup
Ask question
Menu
All categories
English
Mathematics
Social Studies
Business
History
Health
Geography
Biology
Physics
Chemistry
Computers and Technology
Arts
World Languages
Spanish
French
German
Advanced Placement (AP)
SAT
Medicine
Law
Engineering
Alex
3 years ago
5
What two different types of encryption can be used by ipsec during data transfer??
Computers and Technology
Answer
Comment
Send
1
answer:
daser333
[38]
3 years ago
3
0
The two types of encryption are:
Authentication Header (AH)<span>
Encapsulating Security Payload (ESP)</span>
Send
You might be interested in
Jane wants to type a math assignment involving percentages she wants to insert the percent symbol after typing a number which ke
borishaifa [10]
To type a percent symbol. Press shift+5.
8
0
3 years ago
If your hood suddenly flies up you should turn on your hazard lights and continue driving. True or false?
Jobisdone [24]
False you shouldn't be driving with your hood blocking your vision. Pull over and turn on your hazard lights
8
0
3 years ago
Read 2 more answers
A group of users in a small publishing office want to share large image files in a common folder with high availability. Which o
mash [69]
Answer:
Network storage appliances
Explanation:
Because I just took a test
7
0
3 years ago
What mass of nh3 can be made from 35g of n2?
Anton [14]
<span>14 g N in 17 g NH3
so 35 g N will make 17*35/14 = 42.5 g</span>
3
0
3 years ago
By default, headers and footers apply to
AleksAgata [21]
Hold up I know he answer
6
0
3 years ago
Other questions:
A(n) ____ attack is when a system is compromised and used to attack other systems. a. indirect b. direct c. object d. subject
13
·
1 answer
Morgan's cursor is blinking in the center of the page but he would like to move it to the left margin. He should _____.
10
·
1 answer
What setting must be enabled to view data in Demographics and Interests Reports? Content Grouping Advertising features User perm
13
·
1 answer
What change does NOT need to be made to the above cover letter excerpt before sending it to an employer? a. Remove background co
6
·
2 answers
One way to prepare for filing the PROFILE is to:
12
·
2 answers
Colin is a software developer. He would like to earn a credential that demonstrates to employers that he is well educated on sof
15
·
1 answer
What term best describes when the scope of the project changes from what was initially agreed upon?
8
·
1 answer
Which of these is an example of output?
13
·
2 answers
Write a static method named isSorted that takes an array of real numbers as a parameter and that returns true if the list is in
5
·
1 answer
Intro Programming - Problem(s)
14
·
1 answer
×
Add answer
Send
×
Login
E-mail
Password
Remember me
Login
Not registered?
Fast signup
×
Signup
Your nickname
E-mail
Password
Signup
close
Login
Signup
Ask question!