1.

Which Authentication Encryption approach is taken by the IPSec protocol?a) Authentication followed by encryption (A→E)b) Hashing followed by encryption (H→E)c) Encryption followed by authentication (E→A)d) Independently encrypt and authenticate (E +

A. Authentication followed by encryption (A→E)
B. Hashing followed by encryption (H→E)
C. Encryption followed by authentication (E→A)
D. Independently encrypt and authenticate (E + A)
Answer» D. Independently encrypt and authenticate (E + A)


Discussion

No Comment Found