A.mode B.IKE gateway C.security proposal D.Perfect Forward Secrecy
A.mode B.preshared key C.external interface D.security proposals E.dead peer detection settings
A.In the DH key exchange process, the session key is never passed across the network. B.In the DH key exchange process, the public and private keys are mathematically related using the DH algorithm. C.In the DH key exchange process, the session key is passed across the network to the peer for confirmation. D.In the DH key exchange process, the public and private keys are not mathematically related, ensuring higher security