The IPsec protocol suite is made up of various components covering aspects such as confidentiality, encryption, and integrity.
Select the correct statement below regarding the correct configuration options for ensure IPsec confidentiality:
A. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, MD5
B. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, AES
C. The following protocols may be used to configure IPsec confidentiality, PSK, RSA
D. The following protocols may be used to configure IPsec confidentiality, PSK, MD5
E. The following protocols may be used to configure IPsec confidentiality, PSK, RSA
Select the correct statement below regarding the correct configuration options for ensure IPsec confidentiality:
A. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, MD5
B. The following protocols may be used to configure IPsec confidentiality, DES, 3DES, AES
C. The following protocols may be used to configure IPsec confidentiality, PSK, RSA
D. The following protocols may be used to configure IPsec confidentiality, PSK, MD5
E. The following protocols may be used to configure IPsec confidentiality, PSK, RSA