CheckPoint Exam Questions

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

A.
Peers authenticate using certificates or preshared secrets.

B.
The DH public keys are exchanged.

C.
Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.

D.
Symmetric IPsec keys are generated.

Explanation: