With which technology do apply integrity, confidentiall…

With which technology do apply integrity, confidentially and authenticate the source

With which technology do apply integrity, confidentially and authenticate the source

A.
IPSec

B.
IKE

C.
Certificate authority

D.
Data encryption standards

Explanation:
IPsec is a collection of protocols and algorithms used to protect IP packets at Layer 3 (hence
the name of IP Security [IPsec]). IPsec provides the core benefits of confidentiality through
encryption, data integrity through hashing and HMAC, and authentication using digital
signatures or using a pre-shared key (PSK) that is just for the authentication, similar to a
password.



Leave a Reply 0

Your email address will not be published. Required fields are marked *