SSH is a network protocol that allows data to be exchanged between two networks using a secure
channel. Which of the following encryption algorithms can be used by the SSH protocol? Each
correct answer represents a complete solution. Choose all that apply.
A.
Blowfish
B.
DES
C.
IDEA
D.
RC4