Multiple Choice
Which of the following actions do NOT take place in IKE Phase 1?
A) Peers agree on encryption method.
B) Diffie-Hellman key is combined with the key material to produce the symmetrical IPsec key.
C) Peers agree on integrity method.
D) Each side generates a session key from its private key and peer's public key.
Correct Answer:

Verified
Correct Answer:
Verified
Q160: Which pre-defined Permission Profile should be assigned
Q161: Consider the Global Properties following settings: <img
Q162: What Check Point technologies deny or permit
Q163: Browser-based Authentication sends users to a web
Q164: Which firewall daemon is responsible for the
Q166: With the User Directory Software Blade, you
Q167: You want to establish a VPN, using
Q168: What type of NAT is a one-to-one
Q169: Packages and licenses are loaded from all
Q170: What happens if the identity of a