Which of these two functions are required for IPsec operation? (Choose two.)
A.
using SHA for encryption
B.
using PKI for shared-key authentication
C.
using IKE to negotiate the SA
D.
using AH protocols for encryption and authentication
E.
using Diffie-Hellman to establish a shared-secret key