Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the
following options will end the intruder’s access, after the next Phase 2 exchange occurs?
A.
Phase 3 Key Revocation
B.
Perfect Forward Secrecy
C.
MD5 Hash Completion
D.
SHA1 Hash Completion
E.
DES Key Reset