Which method do VPNs use to prevent outside parties from viewing packets in clear text?
What is the correct order of processing when configuring NAT rules and security policies?
Which two statements describe IPsec VPNs? (Choose two.)
Which zone is considered a functional zone?
What does IPsec use to negotiate encryption algorithms?