subject

Which of the following could occur when both strong and weak ciphers are configured on a vpn concentrator? (select two) a. an attacker could potentially perform a downgrade attack. b. the connection is vulnerable to resource exhaustion. c. the integrity of the data could be at risk. d. the vpn concentrator could revert to l2tp. e. the ipsec payload reverted to 16-bit sequence numbers.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 17:20
The thickness of a part is to have an upper specification of 0.925 and a lower specification of 0.870 mm. the average of the process is currently 0.917 with a standard deviation of 0.005. determine the percentage of product above 0.93 mm.
Answers: 3
question
Computers and Technology, 23.06.2019 07:30
Which option allows you to view slides on the full computer screen?
Answers: 1
question
Computers and Technology, 24.06.2019 08:30
Intellectual property rights are exclusive rights that protect both the created and the creation. ipr offers exclusively what benefits to the person or people covered by it
Answers: 3
question
Computers and Technology, 24.06.2019 23:30
Game design colleges anyone know the requirements? ?
Answers: 1
You know the right answer?
Which of the following could occur when both strong and weak ciphers are configured on a vpn concent...
Questions
question
Social Studies, 03.10.2019 05:00