A security administrator must implement a system to allow clients to securely negotiate encryption
keys with the company’s server over a public unencrypted communication channel. Which of the
following implements the required secure key negotiation? (Select TWO).
A.
PBKDF2
B.
Symmetric encryption
C.
Steganography
D.
ECDHE
E.
Diffie-Hellman
Explanation: