Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
A.
Peers authenticate using certificates or preshared secrets.
B.
The DH public keys are exchanged.
C.
Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
D.
Symmetric IPsec keys are generated.
Explanation: