A. AH provides data integrity. B. AH is identified by IP protocol 50. C. AH is identified by IP protocol 51. D. AH cannot work in conjunction with ESP
A. signature B. anomaly C. trojan D. virus E. chain
A. MIME pattern B. file extension C. IP spoofing D. POP3 E. protocol command