PrepAway - Latest Free Exam Questions & Answers

Which two IPsec protocols are used to protect data in motion?

Which two IPsec protocols are used to protect data in motion? (Choose two.)

PrepAway - Latest Free Exam Questions & Answers

A.
Encapsulating Security Payload Protocol

B.
Transport Layer Security Protocol

C.
Secure Shell Protocol

D.
Authentication Header Protocol

Explanation:
IPsec provides three main facilities:

An authentication-only function, referred to as Authentication Header (AH)

A combined authentication/ encryption function called Encapsulating Security Payload (ESP)

A key exchange function. For virtual private networks, both authentication and encryption are
generally desired, because it is important both to a) assure that unauthorized users do not
penetrate the virtual private network, and b) assure that eavesdroppers on the Internet cannot
read messages sent over the virtual private network.
Because both features are generally desirable, most implementations are likely to use ESP rather
than AH. The key exchange function allows for manual exchange of keys as well as an automated
scheme.
Reference: http://www.cisco.com/c/en/us/td/docs/net_mgmt/vpn_solutions_center/2-
0/ip_security/provisioning/guide/IPsecPG1.html


Leave a Reply