Pete, a security administrator, has implemented SSH across all network infrastructure devices in the enterprise. Which of the following protocols will be used to exchange keying material within SSH?
A.
Transport layer protocol
B.
IPSec
C.
Diffie-Hellman
D.
Secure socket layer