Phase 2 uses ___________, if not using Perfect Forward Secrecy.
A.
Symmetric
B.
Conditional
C.
Sequential
D.
Asymmetric
Phase 2 uses ___________, if not using Perfect Forward Secrecy.
Phase 2 uses ___________, if not using Perfect Forward Secrecy.
A.
Symmetric
B.
Conditional
C.
Sequential
D.
Asymmetric
I think the answer is actually C. Phase 2 definitely uses symmetric encryption, but it does that with or without PFS. PFS merely forces a renegotiation of the Phase I IKE process, TO AVOID having sequential numbers making it easier to decode the encryption.