Assume an intruder has compromised your current IKE Phase 1 and Phase 2 keys. Which of the following options will end the intruder’s access after the next Phase 2 exchange occurs?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Perfect Forward Secrecy
B.
SHA1 Hash Completion
C.
Phase 3 Key Revocation
D.
M05 Hash Completion