Question 146
When using digital certificates for authentication in IPsec VPN, it should adopt IKE main mode negotiation and validation of certificate is completed in the 5th 6th packet of the packet exchange.
Question 147
Which of the following attacks is a SYN Flood attack?
