Which of the following IPsec components uses eccouncil video
ethical-hacker video for which of the following IPsec components uses the Diffie–Hellman algorithm to create a master key and a key that is specific to each
Answer
          Full Certification Question
Which of the following IPsec components uses the Diffie–Hellman algorithm to create a master key and a key that is specific to each session in IPsec data transfer?