Security+
VPN Question
• Scenario :
• A systems administrator is configuring a site-to-site VPN between two branch offices. Some of the settings have already been configured correctly.
• The systems administrator has been provided the following requirements as part of completing the configuration:
• Most secure algorithms should be selected
• All traffic should be encrypted over the VPN
• A secret password will be used to authenticate the two VPN concentrators