Three different authentication methods can be used with IKE key determination: Public key encryption, symmetric key encryption, and _________ .
What will be an ideal response?
Question 2
Something a database must do to fulfill its business purpose is called:
A) A requirement
B) A role
C) An entity
D) An attribute