Cyber Security VIIIujlefeunek
Answer the following questions in the Assignment file as part of the Assignment submission for this lab.
- What is an example of a tunnel protocol that does NOT use encryption?
- What is the easiest way to track individual contributions with FTP?
- What are the protocols use
d by IPSec secure exchange in this lab?
Directions for Submitting Your Assignment
Compose your Assignment in a Microsoft Word document and save it, along with your screenshots, as a file entitled IT412_YourName_Unit_1.docx and submit it to the Dropbox for Unit 8.
Answers contain sufficient information to adequately answer the questions and contain no spelling, grammar or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion.
- 4 years ago