Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE), what types of keys are generated by IKE during negotiation?
The Internet Key Exchange (IKE) protocol is used in VPNs to establish a secure communication channel. During the negotiation process, IKE generates symmetric keys on both sides. These symmetric keys are used for encrypting and decrypting the data transmitted over the VPN.
- Symmetric keys: These are identical keys used for both encryption and decryption, ensuring secure communication.
- IKE does not generate asymmetric keys (public/private key pairs) during the negotiation process; instead, it may use asymmetric cryptography (e.g., RSA) for authentication or key exchange, but the final keys used for encryption are symmetric.
This section is not available anymore. Please use the main Exam Page.156-587 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
keikei1228
1 month ago922f9b2
1 month, 1 week ago