Which of the following technologies would allow for this?

A security administrator needs to implement a technology that creates a secure key exchange. Neither party
involved in the key exchange will have pre-existing knowledge of one another. Which of the following
technologies would allow for this?

A security administrator needs to implement a technology that creates a secure key exchange. Neither party
involved in the key exchange will have pre-existing knowledge of one another. Which of the following
technologies would allow for this?

A.
Blowfish

B.
NTLM

C.
Diffie-Hellman

D.
CHAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *