Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?
- transform sets
- a permit access list entry
- hashing algorithms
- a security association
Exam with this question: Network Security Final Exam Answers
Please login or Register to submit your answer