A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?

A. Blowfish
B. NTLM
C. Diffie-Hellman
D. CHAP

Answer: C. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

In the Comments group, the buttons used to navigate through the comments are:

a. GoTo and Return b. Accept and Reject c. Next and Previous

Computer Science & Information Technology

Which of the follow statements are true about menus created through Visual Basic?

a) They provide groups of related commands for Windows apps. b) They organize commands without cluttering the GUI c) They have the capacity to create shortcuts for the menu commands d) All of the above

Computer Science & Information Technology