Ipsec is designed to provide the security at the


Asked by admin @ in Computer Science viewed by 329 People


IPSec is designed to provide security at the...........

A) transport layerB) Network LayerC) Application LayerD) Session Layer​

Answered by admin @



Answer:

Aɴsᴡᴇʀ:-

B)ɴᴇᴛᴡᴏʀᴋ ʟᴀʏᴇʀ

Exᴘʟᴀɴᴀᴛɪᴏɴ:-

IPSᴇᴄ ɪs sᴇᴛ ᴏғ ᴘʀᴏᴛᴏᴄᴏʟs ᴜsᴇᴅ ᴛᴏ ᴘʀᴏᴠɪᴅᴇ ᴀᴜᴛʜᴇɴᴛɪᴄᴀᴛɪᴏɴ,ᴅᴀᴛᴀ ɪɴᴛᴇɢʀɪᴛʏ ᴀɴᴅ ᴄᴏɴғɪᴅᴇɴᴛɪᴀʟɪᴛʏ ʙᴇᴛᴡᴇᴇɴ ᴛᴡᴏ ᴍᴀᴄʜɪɴᴇs ɪɴ ᴀɴ IP ɴᴇᴛᴡᴏʀᴋ. ᴛʜᴇ TCP/IP ᴍᴏᴅᴇʟ,ɪᴛ ᴘʀᴏᴠɪᴅᴇs sᴇᴄᴜʀɪᴛʏ ᴀᴛ ᴛʜᴇ IP ʟᴀʏᴇʀ ɪ.. Tʜᴇ ɴᴇᴛᴡᴏʀᴋ ʟᴀʏᴇʀ.

Hᴏᴘᴇ ɪᴛ ʜᴇʟᴘs ʏᴏᴜ ʙᴇᴛᴛᴇʀ

Dᴏ Fᴏʟʟᴏᴡ

@ᴀᴛʜɪʀᴀᴀᴍᴍᴜ


Similar Questions

All of the following provide intranet security except

Asked by admin @ in Accountancy viewed by 572 persons

All of the following provide intranet security except:- A. Data encryptionB.FirewallC.Data compressionD.User authentication​

Which country was the first to provide social security

Asked by maham237 @ in Geography viewed by 382 persons

Which country was the first to provide social security? Britain New Zealand United States Australia

Security responsibilities of a saas cloud provider is typically upto

Asked by admin @ in Computer Science viewed by 428 persons

Security responsibilities of a iaas cloud provider is typically upto

Security infrastructure design document

Asked by wiki @ in Computers And Technology viewed by 1809 persons

In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the …

Overcoming fixed mindset: a step-by-step guide to cultivating a growth mindset

Asked by wiki @ in Health viewed by 1296 persons

Which of the following would best complete this list?

Asked by wiki @ in Social Studies viewed by 753 persons

What had the king decided to do before he saw the spider

Asked by vanshika149 @ in English viewed by 1154 persons

Describe the karez in your own words

Asked by rajesh064 @ in English viewed by 1324 persons

What is 8 + (x + 5)?

Asked by jaylord7 @ in Mathematics viewed by 1107 persons

What is the topic of the info grapher

Asked by jesus643 @ in History viewed by 1404 persons

Elephant kills 11 in nepal , woman rescued from a friendly dolphine

Asked by kavin044 @ in English viewed by 1282 persons

(-3,0);slope =2/3

Asked by timothy2 @ in Biology viewed by 1663 persons

Most viewed questions in Computer Science


A programmer mistakenly writes gor instead of for

Asked by admin @ in Computer Science viewed by 19030 persons


Domestic data entry operator ncert book class 9 solutions

Asked by admin @ in Computer Science viewed by 15815 persons


Information technology code 402 class 9 solutions chapter 1

Asked by admin @ in Computer Science viewed by 10977 persons



Ncert solutions for class 8 computer chapter 1 computer system

Asked by admin @ in Computer Science viewed by 10407 persons


A scrum team works on a 4 weeks sprint

Asked by admin @ in Computer Science viewed by 8723 persons


Which of the following occupies more memory in c

Asked by admin @ in Computer Science viewed by 8145 persons



A database of motor vehicles has the base entity

Asked by admin @ in Computer Science viewed by 7845 persons


The network architecture can be termed as a mcq

Asked by admin @ in Computer Science viewed by 6492 persons


Cat5 and cat6 cabling refer to which reference model layer

Asked by admin @ in Computer Science viewed by 5795 persons



Class 7 computer chapter 3 questions and answers

Asked by admin @ in Computer Science viewed by 5696 persons


Choose the correct options about usability and user experience

Asked by admin @ in Computer Science viewed by 5479 persons


Which advocates daily team meetings for coordination and integration

Asked by admin @ in Computer Science viewed by 4986 persons



Which three security features match the database security level

Asked by admin @ in Computer Science viewed by 4976 persons


Which of the dbms package is not available

Asked by admin @ in Computer Science viewed by 4688 persons


________ aid a business grow and attain its objectives

Asked by admin @ in Computer Science viewed by 4492 persons