Q) If you were NOT using IKE Aggressive Mode
for your IPsec tunnel, how many packets would you see for normal Phase 1 exchange?
Q) How many packets does the IKE exchange use for Phase 1 Main Mode?
Q) How many packets does the IKE exchange use for Phase 1 Aggressive Mode?
Q) Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
a) Peers authenticate using certificates or preshared secrets.
b) The DH public keys are exchanged.
c) Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
d) Symmetric IPsec keys are generated. Udemy Coupon Code : https://www.udemy.com/course/156-21513-check-point-certified-security-administrator-exam-v/?couponCode=SECURITY