Your organization maintains several IKE VPN’s. Executives in your organization want to know
which mechanism Security Gateway R76 uses to guarantee the authenticity and integrity of
messages. Which technology should you explain to the executives?
A.
Digital signatures
B.
Certificate Revocation Lists
C.
Key-exchange protocols
D.
Application Intelligence
Explanation: