A security administrator must implement a secure key exchange protocol that will allow company clients to
autonomously exchange symmetric encryption keys over an unencrypted channel. Which of the following
MUST be implemented?
A.
SHA-256
B.
AES
C.
Diffie-Hellman
D.
3DES
Explanation:
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric encryption keys across an
insecure medium.