Which of the following protocols should be used for key exchange?

A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?

A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?

A.
SHA-1

B.
RC4

C.
Blowfish

D.
Diffie-Hellman



Leave a Reply to TT Cancel reply2

Your email address will not be published. Required fields are marked *

9 − 4 =


Paul S

Paul S

Diffie Hellmen (an Asymmetric system) was created for the purpose of exchanging symmetric keys from one system to another. It is D.