It is recommended to cross train other system administrators to perform these tasks and mitigate which of the following risks?
Which of the following would allow for secure key exchange over an unsecured network without a pre-shared key?