Which two actions occur during IKE Phase 1? (Choose two.)
A.
A secure channel is established between two peers.
B.
The proxy ID is used to identify which security association is referenced for the VPN.
C.
The Diffie-Hellman key exchange algorithm establishes a shared key for encryption.
D.
The security association is identified by a unique security parameter index value.
http://www.ciscopress.com/articles/article.asp?p=24833&seqNum=6
Authenticates and protects the identities of the IPSec peers
Negotiates a matching IKE SA policy between peers to protect the IKE exchange
Performs an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys
Sets up a secure tunnel to negotiate IKE phase two parameters