Cyber Security VIII
Answer the following questions in the Assignment file as part of the Assignment submission for this lab.What is an example of a tunnel protocol that does NOT use encryption?What is the easiest way to track individual contributions with FTP?What are the protocols used by IPSec secure exchange in this lab?Directions for Submitting Your AssignmentCompose your Assignment in a Microsoft Word document and save it, along with your screenshots, as a file entitled IT412_YourName_Unit_1.docx and submit it to the Dropbox for Unit 8. Assignment RequirementsAnswers contain sufficient information to adequately answer the questions and contain no spelling, grammar or APA errors. Points deducted from grade for each writing, spelling, or grammar error are at your instructor’s discretion.