WhichofthefollowingstatementsthatdescribeDiffieHellmanKeyexchangearecorrect?() A.ADHkeyexchangeisanalgorithmthatutilizesasymmetriccryptographickeys.B.TheDHkeyexchangeisusedtoestablishasharedsecretoveraninsecuremediumduringanIPSecphase1exchange.C.TheDHexchangeissusceptibletoman-in-the-middleattacks.D.TheDHexchangeisusedtoauthenticatethepeerdeviceduringanIPSecphase1exchange.E.ADHexchangeprovidesPerfectForwardSecrecy(PFS).

WhichofthefollowingstatementsthatdescribeDiffieHellmanKeyexchangearecorrect?()

A.ADHkeyexchangeisanalgorithmthatutilizesasymmetriccryptographickeys.

B.TheDHkeyexchangeisusedtoestablishasharedsecretoveraninsecuremediumduringanIPSecphase1exchange.

C.TheDHexchangeissusceptibletoman-in-the-middleattacks.

D.TheDHexchangeisusedtoauthenticatethepeerdeviceduringanIPSecphase1exchange.

E.ADHexchangeprovidesPerfectForwardSecrecy(PFS).


相关考题: