Which two statements about SSL-based VPNs are true? (Choose two.)
A.
Asymmetric algorithms are used for authentication and key exchange.
B.
SSL VPNs and IPsec VPNs cannot be configured concurrently on the same router.
C.
The application programming interface can be used to modify extensively the SSL client software for use in special applications.
D.
The authentication process uses hashing technologies.
E.
Both client and clientless SSL VPNs require special-purpose client software to be installed on the client machine.