A.secure network platform B.secure connectivity C.threat control and containment D.policy management
A.MD65 B.SHA-135 C.XR12 D.MD5
A.L2F tunnel B.L2TP tunnel C.GRE tunnel D.ISAKMP tunnel
A.It is hashed using MD5 B.It is encrypted using a proprietary Cisco encryption algorithm C.It is hashed using SHA D.It is encrypted using DH group 5
A.PKCS #7 B.PKCS #8 C.PKCS #10 D.PKCS #12