An organization wants to conduct secure transactions of large data files. Before encrypting and exchanging the
data files, the organization wants to ensure a secure exchange of keys. Which of the following algorithms is
appropriate for securing the key exchange?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
DES
B.
Blowfish
C.
DSA
D.
Diffie-Hellman
E.
3DES