1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maksim [4K]
3 years ago
14

What udp port is used for i k e traffic from vpn client to server?

Computers and Technology
1 answer:
Reil [10]3 years ago
6 0
<span>Ports are used to distinguish among multiple destination processes in a single host computer.</span>
UDP (User Datagram Protocol)<span> port 500 is used for i k e traffic from VPN client to server.
</span><span>This port is used during the establishment of secure VPN tunnels.
</span>
You might be interested in
match the parts of a project plan listed in Column A to the specific examples given in Column B.Write the letter of your answer
prisoha [69]

Answer:

  1. The name of the project is    C: Reversible Playmat
  2. The objectives are given in B
  3. The Sketch is given as D
  4. The Materials needed is listed in A
  5. The procedure is F
  6. Evaluation is E

Explanation:

You would find that the other matches are relatively easy save for B and F. The difference between the procedure is that the procedure is more detailed about what needs to be done.

Notice that F states exactly, the dimensions that need to be cut while B albeit wordier, gives a description of the end result only.

Cheers.

7 0
3 years ago
What is alphabet symmetry
Nataly [62]
A line of symmetry creates two congruent figures that are mirror images of each other
3 0
3 years ago
Read 2 more answers
A/an ________is a device used to protect computers against surges and spikes in power.
givi [52]

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

7 0
3 years ago
Individuals who break into computer systems with the intention of doing damage are called​ _____________.
notka56 [123]
I think the answer is hackers
7 0
3 years ago
Was communication always formal?
DaniilM [7]
No. Communication not always formal.
4 0
3 years ago
Other questions:
  • If you wanted to insert pictures into a presentation which tab would you use
    6·2 answers
  • Survey Q. Non-scoring: What role is played in the team? (1 correct answer)
    14·1 answer
  • What controls the duration of light that is allowed on the sensors
    15·1 answer
  • What should be done on a tablet in order for that tablet to cease all network connections?
    7·1 answer
  • Daniel has a list of numbers that are not in any order. He wants to find the order of the numbers with the help of a spreadsheet
    10·2 answers
  • Step 1: Configure the initial settings on R1. Note: If you have difficulty remembering the commands, refer to the content for th
    10·1 answer
  • Software built and delivered in pieces is known as
    14·2 answers
  • Reports produced by the United Nations are considered
    11·2 answers
  • Which of the following is not a use of a hash function
    7·1 answer
  • What does computer graphics mean?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!