McqMate
Sign In
Hamberger menu
McqMate
Sign in
Sign up
Home
Forum
Search
Ask a Question
Sign In
McqMate Copyright © 2025
→
Computer Science Engineering (CSE)
→
Information Cyber Security (ICS)
→
IKE uses _______
Q.
IKE uses _______
A.
oakley
B.
skeme
C.
isakmp
D.
all of the above
Answer» D. all of the above
2.3k
0
Do you find this helpful?
15
View all MCQs in
Information Cyber Security (ICS)
Discussion
No comments yet
Login to comment
Related MCQs
IKE creates SAs for _____.
An HTTP connection uses port _________ whereas HTTPS uses port ____________ and invokes SSL
What type of attack uses a fraudulent server with a relay address?
A asymmetric-key (or public key ) cipher uses
The DSS signature uses which hash algorithm?
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network.
_______ uses the idea of certificate trust levels.
An asymmetric-key (or public-key) cipher uses
Pretty good privacy (PGP) security system uses
An asymmetric-key (or public-key) cipher uses