Which of the following protocols uses the Internet key Exchange (IKE) protocol to set up security associations (SA)?
Which of the following evidences are the collection of facts that, when considered together, can be used to infer a conclusion about the malicious activity/person?