Which two statements about IKEv2 are true?(Choose two)
A.
it uses EAP authentication
B.
At minimum. A complete proposal requires one encryption algorithm and one
integrity algorithm.
C.
The profile contains a repository of symmetric and asymmetric and asymmetric
preshared keys.
D.
It uses X.509 certificates for authentication
E.
The profile is a collection of transforms used to negotiate IKE SASF. It supports DPD and NAT-T by default.