1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Wewaii [24]
3 years ago
5

Which of the following could occur when both strong and weak ciphers are configured on a VPN concentrator? (Select TWO) A. An at

tacker could potentially perform a downgrade attack. B. The connection is vulnerable to resource exhaustion. C. The integrity of the data could be at risk. D. The VPN concentrator could revert to L2TP. E. The IPSec payload reverted to 16-bit sequence numbers.
Computers and Technology
1 answer:
Elza [17]3 years ago
3 0

Answer:

A. An attacker could potentially perform a downgrade attack.

E. The IPSec payload reverted to 16-bit sequence numbers.

Explanation:

When both strong and weak ciphers are configured on a VPN concentrator, the following are likely to occur;

An attacker could potentially perform a downgrade attack

The IPSec payload reverted to 16-bit sequence numbers

You might be interested in
Select the risks associated with the Internet.
tino4ka555 [31]
Sharing your personal information and identity theft but if you’re supposed to choose one then sharing your personal information must be right
3 0
2 years ago
Un automobil se desplaza a 1 458 km en direccion hacia el norte en un tiempo den 18 h. Cual es la velocidad promedio utilizada p
d1i1m1o1n [39]

Answer:

42

Explanation:

7 0
2 years ago
Dev10 is an Active Directory Domain Services (AD DS) domain member that runs Windows 10 Enterprise.
zubka84 [21]
Do I suppose to answer a question please let me know
8 0
3 years ago
Jqiom:FNU Ojlak toiha 438oy9ctu4jmpvke,u9wjm8i
Mazyrski [523]

Answer:

dfghgfdfghgfdfghgfdfghjhgfdfghjhgfdfghjhgfghjhgferghjhre

Explanation:

3 0
3 years ago
A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account be
levacccp [35]

The security specialist has discovers a malicious script on a computer known as a logic bomb.

<h3>Is logic bomb a type of malware?</h3>

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

brainly.com/question/399317

#SPJ1

7 0
2 years ago
Other questions:
  • 1. How does inertia affect a person who is not wearing a seatbelt during a collision? 
    14·2 answers
  • What is after Windows 8.1
    11·2 answers
  • /*
    8·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • Mobile phones that function as credit cards are called _____.
    11·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • _________ are the special effects that you see when one slide changes to another in slide show view​
    15·1 answer
  • PLS HELP WITH MY PYTHON HW ILL GIVE YOU BRAINLIEST
    12·1 answer
  • What are the main differences between openldap and microsoft's active directory (ad)? check all that apply
    13·1 answer
  • which of the following commands can be used to display any email messages awaiting delivery alongside the reason that they were
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!