An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys.Which of the following algorithms is appropriate for securing the key exchange?

A. DES
B. Blowfish
C. DSA
D. Diffie-Hellman
E. 3DES

Answer: D. Diffie-Hellman

Computer Science & Information Technology

You might also like to view...

The inside address on a letter template is a place reserved for information that should appear on every page

Indicate whether the statement is true or false

Computer Science & Information Technology

What are the two different supported frame formats that are used when deploying a T1 leased line?

A) Super Frame B) Extended Super Frame C) Multi Frame D) Distributed Frame

Computer Science & Information Technology