1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alex
3 years ago
5

What two different types of encryption can be used by ipsec during data transfer?​?

Computers and Technology
1 answer:
daser333 [38]3 years ago
3 0
The two types of encryption are:

Authentication Header (AH)<span> 
Encapsulating Security Payload (ESP)</span>
You might be interested in
Rachel typed two paragraphs and then realized she was in the wrong document. What steps should Rachel follow to quickly move the
igomit [66]
It would be A. I hope that this helps!
6 0
3 years ago
Read 2 more answers
You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard a
Romashka-Z-Leto [24]
I think it’s A have no idea tho
7 0
4 years ago
What makes manually cleaning data challenging?
Alexxandr [17]

Manually cleaning data is done manually which makes it challenging. This make it prone to mistakes.

6 0
3 years ago
What can you do if brainstorming only gives you a small or incomplete idea?
Grace [21]

Answer:

D. All of the above

Explanation:

5 0
3 years ago
Type the correct answer in the box. Spell the word correctly.
aev [14]

Answer:if you are looking for video and audio data its mp4

Explanation:

there is no explaination

8 0
4 years ago
Read 2 more answers
Other questions:
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • Is badlion safe and how ?
    14·1 answer
  • Which option describes wearable technology?
    9·1 answer
  • To drive defensively means taking proactive measures to avoid accident situations regardless of their potential causes.
    6·2 answers
  • According to the video, what are some concerns of Webmasters? Check all that apply.
    7·2 answers
  • Modify the program you wrote for Chapter 6 Exercise 6 so it handles the following
    15·1 answer
  • I can talk to you! How about we talk through the you know where people comment and say stuff about the question1
    10·2 answers
  • Find an interesting case on the concept of intellectual property
    14·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!