If an authentication protocol is being implemented that uses a private key and a session key, the
protocol is:
A.
L2TP (Layer 2 Tunneling Protocol).
B.
Kerberos
C.
IPSec (Internet Protocol Security).
D.
PPTP (Point-to-Point Tunneling Protocol).
If an authentication protocol is being implemented that uses a private key and a session key, the
protocol is:
If an authentication protocol is being implemented that uses a private key and a session key, the
protocol is:
A.
L2TP (Layer 2 Tunneling Protocol).
B.
Kerberos
C.
IPSec (Internet Protocol Security).
D.
PPTP (Point-to-Point Tunneling Protocol).