Home / Engineering / Information Cyber Security (ICS) / Question

M

Mr. Dubey • 51.43K Points
Coach

Q.) The _______ mode is normally used when we need host-to-host (end-to-end) protection of data.

(A) transport
(B) tunnel
(C) either (a) or (b)
(D) neither (a) nor (b)
Correct answer : Option (A) - transport

Share

Discusssion

Login to discuss.