CheckPoint Exam Questions

Phase 2 uses ___________, if not using Perfect Forward Secrecy.

Phase 2 uses ___________, if not using Perfect Forward Secrecy.

A.
Symmetric

B.
Conditional

C.
Sequential

D.
Asymmetric