Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?