问题:
A . A DH key exchange is an algorithm that utilizes asymmetric cryptographic keys.
B . The DH key exchange is used to establish a shared secret over an insecure medium during an IPSec phase 1 exchange.
C . The DH exchange is susceptible to man-in-the-middle attacks.
D . The DH exchange is used to authenticate the peer device duringan IPSec phase 1 exchange.
E . A DH exchange provides Perfect Forward Secrecy (PFS).
● 参考解析
本题暂无解析