A security administrator must implement a system to allow clients to securely negotiate
encryption keys with the company’s server over a public unencrypted communication
channel. Which of the following implements the required secure key negotiation? (Select
TWO).
A.
PBKDF2
B.
Symmetric encryption
C.
Steganography
D.
ECDHE
E.
Diffie-Hellman