Your organization maintains several IKE VPN’s. Executives in your organization want to
know which mechanism Security Gateway R77 uses to guarantee the authenticity and
integrity of messages. Which technology should you explain to the executives?
A.
Application Intelligence
B.
Key-exchange protocols
C.
Certificate Revocation Lists
D.
Digital signatures