An IT administrator wants to restrict DNS zone transfers between two geographically dispersed,
external company DNS name servers, and has decided to use TSIG. Which of the following are
critical when using TSIG? (Select TWO).
A.
Periodic key changes once the initial keys are established between the DNS name servers.
B.
Secure exchange of the key values between the two DNS name servers.
C.
A secure NTP source used by both DNS name servers to avoid message rejection.
D.
DNS configuration files on both DNS name servers must be identically encrypted.
E.
AES encryption with a SHA1 hash must be used to encrypt the configuration files on both DNS
name servers.