In the IKE properties window, you can use the Data Integrity drop-down menu to select:
A.
The cryptographic checksum method to be used for ensuring data integrity.
B.
The Certificate Authority to be used for ensuring data integrity.
C.
The shared secret to be used for ensuring data integrity.
D.
The CA checksum method to be used for ensuring data integrity.
E.
The shared-secret checksum method to be used for ensuring data integrity.
Explanation:
: This is true, from this drop menu at the properties of IKE you can select how do you want to
ensure the data integrity, the integrity is one of the pillars of network security, it provides a
guarantee that the information has not changed or tampered with from the source to the final
destination. Integrity is usually achieved with digital signatures and algorithms. In IKE VPN´s we
can use two algorithms MD5 (Message Digest 5) and SHA1 (Secure Hashing Algorithm 1).