Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current lKE Phase 1 and Phase 2 keys.
Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

Assume an intruder has compromised your current lKE Phase 1 and Phase 2 keys.
Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?

A.
Phase 3 Key Revocation

B.
Perfect Forward Secrecy

C.
MD5 Hash Completion

D.
SHA1 Hash Completion

E.
DES Key Reset



Leave a Reply 1

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I choose B