Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)?
Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?