Which statement describes the operation of the IKE protocol?
- It uses IPsec to establish the key exchange process.
- It uses sophisticated hashing algorithms to transmit keys directly across a network.
- It calculates shared keys based on the exchange of a series of data packets.
- It uses TCP port 50 to exchange IKE information between the security gateways.
Exam with this question: CCNA Security Chapter 8 Exam (CCNAS v1.2)
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)
Please login or Register to submit your answer