A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?
A. Blowfish
B. NTLM
C. Diffie-Hellman
D. CHAP
Answer: C. Diffie-Hellman
Computer Science & Information Technology
You might also like to view...
In the Comments group, the buttons used to navigate through the comments are:
a. GoTo and Return b. Accept and Reject c. Next and Previous
Computer Science & Information Technology
Which of the follow statements are true about menus created through Visual Basic?
a) They provide groups of related commands for Windows apps. b) They organize commands without cluttering the GUI c) They have the capacity to create shortcuts for the menu commands d) All of the above
Computer Science & Information Technology