Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
Which two protocols in the IPsec suite are most used for authentication and encryption? (Choose two.)
In the IPsec suite, two primary protocols used for authentication and encryption are Encapsulating Security Payload (ESP) and Internet Key Exchange (IKE). ESP is responsible for providing confidentiality, data origin authentication, and data integrity. IKE is used to establish a shared security policy and authenticated keys for the IPsec protocol. The other options, Secure Shell (SSH) and Security Association (SA), are not primarily used in the context of IPsec for these purposes.
IKE, ESP Page 204 of study guide 7.0 Page 232 of study guide 7.2
Page 232 of study guide 7.2
IKE ESP Page 204 of study guide
IKE, ESP - Answers AC
IKE and ESP
None of these questions are on the 7.0 test
Page 232 of study guide 7.2
A, and C => IKE and ESP
A & C for IPSec phase 1 and 2, B (SSH) for Remote Access
A & C for IPSec phase 1 and 2, B (SSH) for Remote Access
are there variations of this question with another options?