What are three steps in the IKE certificate authentication process?

What are three steps in the IKE certificate authentication process? Choose three.

What are three steps in the IKE certificate authentication process? Choose three.

A.
The identity certificate signature is validated using the stored root certificate.

B.
The root certificate is not in the Cisco VPN Concentrator.

C.
The identity certificate validity period is verified against the system clock of the Cisco VPN
Concentrator.

D.
Identity certificates are exchanged during IPSec negotiations.

E.
If enabled, the Cisco VPN Concentrator locates the CRL and validates the identity certificate.

F.
The signature is validated using the stored identity certificate.



Leave a Reply 0

Your email address will not be published. Required fields are marked *