When configuring the Internet Key Exchange (IKE) daemon, which two exchanges can system administrators choose to do? (Choose two.)

A.
shared secret keys
B.
public keying material
C.
public key certiticates
D.
private key certificates
E.
shared key certificates