A security administrator needs to implement a technology that creates a secure key exchange.
Neither party involved in the key exchange will have pre-existing knowledge of one another. Which
of the following technologies would allow for this?
A.
Blowfish
B.
NTLM
C.
Diffie-Hellman
D.
CHAP