7. What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation? (Choose all that apply.) IPSec协议使用哪两个IKE方法来保护隧道协商的信息?(选出所有满足条件的答 案)
A.IKEv1
B.IKE-New
C.IKEv2
D.IKEng
7. What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation? (Choose all that apply.) IPSec协议使用哪两个IKE方法来保护隧道协商的信息?(选出所有满足条件的答 案)
A.IKEv1
B.IKE-New
C.IKEv2
D.IKEng