exam questions

Exam 156-587 All Questions

View all questions & answers for the 156-587 exam

Exam 156-587 topic 1 question 53 discussion

Actual exam question from Checkpoint's 156-587
Question #: 53
Topic #: 1
[All 156-587 Questions]

Like a Site-to-Site VPN between two Security Gateways, a Remote Access VPN relies on the Internet Key Exchange (IKE), what types of keys are generated by IKE during negotiation?

  • A. Produce a symmetric key on both sides
  • B. Produce an asymmetric key on both sides
  • C. Symmetric keys based on pre-shared secret
  • D. Produce a pair of public and private keys
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
keikei1228
1 month ago
Selected Answer: A
The Internet Key Exchange (IKE) protocol is used in VPNs to establish a secure communication channel. During the negotiation process, IKE generates symmetric keys on both sides. These symmetric keys are used for encrypting and decrypting the data transmitted over the VPN. - Symmetric keys: These are identical keys used for both encryption and decryption, ensuring secure communication. - IKE does not generate asymmetric keys (public/private key pairs) during the negotiation process; instead, it may use asymmetric cryptography (e.g., RSA) for authentication or key exchange, but the final keys used for encryption are symmetric.
upvoted 1 times
...
922f9b2
1 month, 1 week ago
Selected Answer: C
its actually C
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...