Which of the following MUST be implemented?

A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?

A security administrator must implement a secure key exchange protocol that will allow company
clients to autonomously exchange symmetric encryption keys over an unencrypted channel.
Which of the following MUST be implemented?

A.
SHA-256

B.
AES

C.
Diffie-Hellman

D.
3DES

Explanation:
Diffie-Hellman key exchange (D-H) is a means of securely generating symmetric encryption keys
across an insecure medium.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

three + ten =