A security administrator wishes to change their wireless network so that IPSec is built into the protocol and NAT is no longer required for address range extension. Which of the following protocols should be used in this scenario?
Network Security | |
Compliance and Operational Security | |
Threats and Vulnerabilities | |
Application, Data and Host Security | |
Access Control and Identity Management | |
Cryptography |