Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

A.
Symmetric IPsec keys are generated.
B. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
C.
The DH public keys are exchanged.
D.
Peers authenticate using certificates or preshared secrets.
A)
0
0
A
0
0