Watch this video on YouTube
An engineer needs to ensure that packets passing between two network devices are encrypted and authenticated. Which protocol can be used to accomplish this?