A security administrator needs to implement a technology that creates a secure key exchange. Neither party
involved in the key exchange will have pre-existing knowledge of one another. Which of the following
technologies would allow for this?
A.
Blowfish
B.
NTLM
C.
Diffie-Hellman
D.
CHAP