You have been hired as a consultant to help deploy IPSec for the network of a mediumsize
manufacturing firm that is developing a number of new products and must share sensitive data
about its products over the network. As part of the planning process, you must determine the best
authentication method to use with IPSec. What are the authentication methods that can be used
with IPSec? (Select all that apply.)
A.
Kerberos v5
B.
Perfect Forward Secrecy (PFS)
C.
Shared secret
D.
Diffie-Hellman groups