All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
A.
SSL.
B.
SSH.
C.
L2TP.
D.
IPsec.
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
All of the following provide confidentiality protection as part of the underlying protocol EXCEPT:
A.
SSL.
B.
SSH.
C.
L2TP.
D.
IPsec.