PrepAway - Latest Free Exam Questions & Answers

Which of the following algorithms is appropriate for securing the key exchange?

An organization wants to conduct secure transactions of large data files. Before encrypting and
exchanging the data files, the organization wants to ensure a secure exchange of keys. Which of
the following algorithms is appropriate for securing the key exchange?

PrepAway - Latest Free Exam Questions & Answers

A.
DES

B.
Blowfish

C.
DSA

D.
Diffie-Hellman

E.
3DES

5 Comments on “Which of the following algorithms is appropriate for securing the key exchange?


Leave a Reply