Which three items can be specified by ISAKMP policy parameters? (Choose three.)
- the hashing method to be used
- the encryption method to be used
- the encapsulation method to be used
- the authentication method to be used
- the ACL that is used to identify interesting traffic
- the amount of time the crypto interface should be active before being renegotiated
Exam with this question: CCNP ROUTE (Version 6.0) Chapter 7 Exam
Please login or Register to submit your answer