Which three statements are functions that are performed by IKE phase 1? (Choose three.)
A.
It builds a secure tunnel to negotiate IKE phase 1 parameters.
B.
It establishes IPsec security associations.
C.
It authenticates the identities of the IPsec peers.
D.
It protects the IKE exchange by negotiating a matching IKE SA policy.
E.
It protects the identities of IPsec peers.
F.
It negotiates IPsec SA parameters.
IKE phase 1 is doing identity exchange, prepare for the phase 2 for the SA session.
The aggressive mode is less protecting the process but faster.