What of the following statements that describe Diffie Hellman Key exchange are correct? (Choose
4)
A.
The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange
B.
A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys
C.
The DH exchange is used to authenticate the peer device during an IPSec phase 1 exchange
D.
The DH exchange is susceptible to man-in-the-middle attacks
E.
A DH exchange provides Perfect Forward Secrecy (PFS )