Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
Home
Computational Fluid Dynamics
Which mode of IPsec should you use to assure the security and confidentiality of data within the...
0
votes
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
Which mode of IPsec should you use to assure the security and confidentiality of data within the same LAN?
a) ESP transport mode
b) AH transport mode
c) AH tunnel mode
d) ESP tunnel mode
ipsec
security
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 5, 2023
by
rajeshsharma
a) ESP transport mode
Your comment on this answer:
Email me at this address if a comment is added after mine:
Email me if a comment is added after mine
Privacy: Your email address will only be used for sending these notifications.
Related questions
0
votes
Q: IPsec defines two protocols: _______ and ________.
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
ipsec
protocols
0
votes
Q: IPSec is usually implemented at the operating system level.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ipsec
operating-system
0
votes
Q: The following can be classified as which kind of threat as per Microsoft STIDE threat classification model? ‘Modifying a DLL on disk or DVD, or packet as it traverses the LAN;.
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
threat-modeling
spoofing
security
ssa
0
votes
Q: Which of the following information item holds highest critically from confidentiality perspective?
asked
Mar 18, 2021
in
Threat Modeling
by
sharadyadav1986
confidential-information
security
ssa
0
votes
Q: The confidentiality of information is compromised when:
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: What strategies do you use to stay up-to-date with the latest security threats and vulnerabilities?
asked
Mar 3
in
Azure
by
sharadyadav1986
security
threats
vulnerabilities
0
votes
Q: You are working on a project and require logging on to the environment managed by the client. The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
Q: You have a business need to use an Internet-based chat messenger not approved by the company. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
kamalkhandelwal29
security
+1
vote
Q: What is the use of a firewall and how it can be implemented in Cyber Security?
asked
Sep 10, 2020
in
Cyber Security
by
Hodge
#cyber
security
0
votes
Q: Which two types of IPsec can be used to secure communications between two LANs?
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
communications
lan
...