When two entities try to establish a VPN tunnel, each side supplies its peer with random information signed by its private key and with the certificate that contains the:
A.
Diffie-Hellman
B.
Algorithm
C.
Public key
D.
Private key
E.
Authentication
When two entities try to establish a VPN tunnel, each side supplies its peer with random information signed by its private key and with the certificate that contains the:
When two entities try to establish a VPN tunnel, each side supplies its peer with random information signed by its private key and with the certificate that contains the:
A.
Diffie-Hellman
B.
Algorithm
C.
Public key
D.
Private key
E.
Authentication