Which of the following protocols should a Chief Security Officer configure in the network of his
company to protect sessionless datagram protocols?
A.
SWIPE
B.
S/MIME
C.
SKIP
D.
SLIP
Which of the following protocols should a Chief Security Officer configure in the network of his
company to protect sessionless datagram protocols?
Which of the following protocols should a Chief Security Officer configure in the network of his
company to protect sessionless datagram protocols?
A.
SWIPE
B.
S/MIME
C.
SKIP
D.
SLIP