Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

A.
Perfect Forward Secrecy

B.
SHA1 Hash Completion

C.
Phase 3 Key Revocation

D.
M05 Hash Completion



Leave a Reply 0

Your email address will not be published. Required fields are marked *