WhichofthefollowingstatementsthatdescribeDiffieHellmanKeyexchangearecorrect?() A.ADHkeyexchangeisanalgorithmthatutilizesasymmetriccryptographickeys.B.TheDHkeyexchangeisusedtoestablishasharedsecretoveraninsecuremediumduringanIPSecphase1exchange.C.TheDHexchangeissusceptibletoman-in-the-middleattacks.D.TheDHexchangeisusedtoauthenticatethepeerdeviceduringanIPSecphase1exchange.E.ADHexchangeprovidesPerfectForwardSecrecy(PFS).
WhichofthefollowingstatementsthatdescribeDiffieHellmanKeyexchangearecorrect?()
A.ADHkeyexchangeisanalgorithmthatutilizesasymmetriccryptographickeys.
B.TheDHkeyexchangeisusedtoestablishasharedsecretoveraninsecuremediumduringanIPSecphase1exchange.
C.TheDHexchangeissusceptibletoman-in-the-middleattacks.
D.TheDHexchangeisusedtoauthenticatethepeerdeviceduringanIPSecphase1exchange.
E.ADHexchangeprovidesPerfectForwardSecrecy(PFS).