Which three algorithms are used by an SRX Series device to validate the integrity of the data exchanged through an IPsec VPN?
Which two parameters must be identical to the remote device’s parameters when designing the local IKE proposal?
Which two technologies should you use to fail over from a primary to a secondary tunnel in less than 60 seconds?