Pete, a security administrator, has implemented SSH across all network infrastructure devices in
the enterprise. Which of the following protocols will be used to exchange keying material within
SSH?
A.
Transport layer protocol
B.
IPSec
C.
Diffie-Hellman
D.
Secure socket layer