Correct Answer: Weak Encryption
Explanation:
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Virtual Private Network - VPN Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Virtual Private Network - VPN MCQ Questions
Which protocols are supported by PPTP?
Which topologies are possible in an IPSec VPN?
Which are the most important issues in key management?
Which ways can be used to generate SSL certificates?
Which are IPSec modes?
How many key combinations are possible if the length of the key is 56 bits?
Which VPN protocol is resistant to Denial-of-Service attack?
Which port is used by PPTP?
Which protocol is used by PPTP?
At which layer do SSL VPNs work in the OSI model?