The IKE protocol is used to set up an SA for IPsec automatic negotiation. Identity authentication can be performed when the IP address of the initiator changes dynamically.

The IKE protocol is used to set up an SA for IPsec automatic negotiation. Identity authentication can be performed when the IP address of the initiator changes dynamically.
A. True
B. False

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.