What type of protocol is considered connection-oriented?
Which type of Intrusion Prevention System can monitor and validate encrypted data?
How many IPsec rules are there in Microsoft Firewall configuration?
At what layer does a switch normally operate?