Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office?
Which two methods use IPsec to provide secure connectivity from the branch office to the headquarters office? (Choose two.)
Select 2 response(s).