Which two statements about the DH group are true? (Choose two.)
A.
The DH group is used to provide data authentication.
B.
The DH group is negotiated in IPsec phase-1.
C.
The DH group is used to provide data confidentiality.
D.
The DH group is used to establish a shared key over an unsecured medium.
E.
The DH group is negotiated in IPsec phase-2.