Which action do IPsec peers take during the IKE Phase 2 exchange?
- exchange of DH keys
- negotiation of IPsec policy
- negotiation of IKE policy sets
- verification of peer identity
Explanation: The IKE protocol executes in two phases. During Phase 1 the two sides negotiate IKE policy sets, authenticate each other, and set up a secure channel. During the second phase IKE negotiates security associations between the peers.
Exam with this question: CCNA Security Chapter 8 Exam Answers
Exam with this question: Network Security 1.0 Final Exam Answers
Exam with this question: CCNA Security Chapter 8 Exam (CCNAS v1.2)
Please login or Register to submit your answer