YouneedtodesignamethodofcommunicationbetweentheITandHRdepartments.Yoursolutionmustmeetbusinessrequirements.Whatshouldyoudo?() A.DesignacustomIPSecpolicytoimplementEncapsulatingSecurityPayload(ESP)forallIPtrafficDesigntheIPSecpolicytousecertificate-basedauthenticationbetweenthetwodepartments’computersB.DesignacustomerIPSecpolicytoimplementAuthenticationHeader(AH)forallIPtraffic.DesingtheIPSecpolicytousepresharedkeyauthenticationbetweenthetwodepartments’computersC.DesignacustomerIPSecpolicytoimplementEncapsulatingPayload(ESP)forallIPtraffic.DesingtheIPSecpolicytousepresharedkeyauthenticationbetweenthetwodepartments’computersD.DesignacustomerIPSecpolicytoimplementAuthenticationHeader(AH)forallIPtraffic.DesingtheIPSecpolicytousecertificate-basedauthenticationbetweenthetwodepartments’computers
YouneedtodesignamethodofcommunicationbetweentheITandHRdepartments.Yoursolutionmustmeetbusinessrequirements.Whatshouldyoudo?()
A.DesignacustomIPSecpolicytoimplementEncapsulatingSecurityPayload(ESP)forallIPtrafficDesigntheIPSecpolicytousecertificate-basedauthenticationbetweenthetwodepartments’computers
B.DesignacustomerIPSecpolicytoimplementAuthenticationHeader(AH)forallIPtraffic.DesingtheIPSecpolicytousepresharedkeyauthenticationbetweenthetwodepartments’computers
C.DesignacustomerIPSecpolicytoimplementEncapsulatingPayload(ESP)forallIPtraffic.DesingtheIPSecpolicytousepresharedkeyauthenticationbetweenthetwodepartments’computers
D.DesignacustomerIPSecpolicytoimplementAuthenticationHeader(AH)forallIPtraffic.DesingtheIPSecpolicytousecertificate-basedauthenticationbetweenthetwodepartments’computers