IPsec peer authentication is typically implemented through which two methods? (Choose two.)
A.
pre-shared key
B.
Diffie-Hellman (DH)
C.
non-encryptedNounce
D.
digital certificate
E.
AAA
F.
one-time password
IPsec peer authentication is typically implemented through which two methods? (Choose two.)
IPsec peer authentication is typically implemented through which two methods? (Choose two.)
A.
pre-shared key
B.
Diffie-Hellman (DH)
C.
non-encryptedNounce
D.
digital certificate
E.
AAA
F.
one-time password