You are a firewall administrator using SecuRemote. You are providing digital signatures to achieve
both data integrity checking and verification of sender. Certificates are possible when using
________.
A.
3DES
B.
IKE
C.
IKE with SHIP.
D.
IKE with Manual IPSec.
Explanation:
: if we need to use certificates, we will have to use IKE, as the name says “Internet Key Exchange”
will be the vehicle to obtain the certificates, because IKE its the one in charge of changing the
different keys provided to use and validate certificates. See IKE definition in the Checkpoint Online
documentation.