An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the data files, the organization wants to ensure a secure exchange of keys.Which of the following algorithms is appropriate for securing the key exchange?
A. DES
B. Blowfish
C. DSA
D. Diffie-Hellman
E. 3DES
Answer: D. Diffie-Hellman
Computer Science & Information Technology
You might also like to view...
The inside address on a letter template is a place reserved for information that should appear on every page
Indicate whether the statement is true or false
Computer Science & Information Technology
What are the two different supported frame formats that are used when deploying a T1 leased line?
A) Super Frame B) Extended Super Frame C) Multi Frame D) Distributed Frame
Computer Science & Information Technology