Use the Internet or the to research articles on Internet Key Exchange (IKE) and the role it plays in establishing secure Virtual Private Networks (VPN) communications.
- Give your opinion on the least difficult and most difficult step(s) in VoIP penetration testing. Explain in detail the reasons for your choice.
- From the e-Activity, discuss the role that IKE plays in VPNs. Next, determine the main strengths and weaknesses of IKE and provide defensive measures that you would suggest to mitigate the weaknesses.