Question 10 out of 2 pointsThere are ______ types of protocols used for transferring email.Question 20 out of 2 pointsThe _________ payload allows IKE SAs to be authenticated using EAP.Question 30 out of 2 pointsIKE key determination employs __________ to ensure against replay attacks.Question 42 out of 2 pointsThe SSL Internet standard version is calledQuestion 52 out of 2 pointsThe __________ payload contains either error or status informationassociated with this SA or this SA negotiation.Question 60 out of 2 points_________ identifies the type of data contained in the payload data fieldby identifying the first header in that payload.Question 72 out of 2 pointsThe most complex part of TLS is the __________Question 82 out of 2 pointsA value chosen by the responder to identify a unique IKE SA is a _________.Question 90 out of 2 points