1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
12

You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode

for IPSec possible. Which of the following is best?
A) Tunneling
B) AH
C) IKE
D) Transport
Computers and Technology
1 answer:
liq [111]3 years ago
8 0

Answer:

Tunneling

Explanation:

A networking protocol that is used to send data from one network to another network by encapsulation process.

It is the more secured method as it secures the data with the help of encapsulation process. Rest of the protocols are not helpful in security of data.

You might be interested in
What is the utility of a lever?
Kamila [148]
Muy cosas.
 fazer una montanha russa andar,ativar una armadilha, ativar una puerta etc.
3 0
3 years ago
Read 2 more answers
What is variable declaration in java ​
Airida [17]

Answer:

A variable declaration is a name given to a memory location. It is the basic unit of storage in a program.

8 0
3 years ago
Read 2 more answers
Can someone help me write an algorithm and a flow chart pls for question 3
emmainna [20.7K]

for i in range(20, 51, 2):

      print(i)

6 0
3 years ago
A good way to assess your CPU usage is to:_______.
inna [77]
C is likely the best answer here.
8 0
3 years ago
James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
s2008m [1.1K]

Answer:

IP address

Explanation:

In computer networks, every computer has assigned with a unique address that is called logical address or IP address.

This address is assigned by ICANN and used to access that particular computer by other computers on the network.

3 0
3 years ago
Other questions:
  • Which category of app does word processing software fall into? A. Productivity B. Entertainment C. Social networking D. Educatio
    14·2 answers
  • A form of speech that is used to clarify, describe, demonstrate, and/or explain is referred to as _____.
    7·2 answers
  • Design an algorithm for finding all the factors of a positive integer. For example, in the case of the integer 12, your algorith
    8·1 answer
  • Please check my answer! (Java)
    13·1 answer
  • An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called
    11·1 answer
  • What might happen if the internet use policies were broken at your school
    11·2 answers
  • How are IP addresses usually written?
    7·1 answer
  • JUST MAXED OUT THE COMMENTS anyways come here
    7·2 answers
  • I found a brand-new charger wire still in its plastic package, but it's six years old and has never been used. Is it safe to use
    9·1 answer
  • Because his father _____ his ten-speed bike away to punish him for his failing grades, the boy sulked for two days.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!