CompTIA Exam Questions

Which of the following algorithms is appropriate for securing the key exchange?

An organization wants to conduct secure transactions of large data files. Before encrypting and
exchanging the data files, the organization wants to ensure a secure exchange of keys. Which of
the following algorithms is appropriate for securing the key exchange?

A.
DES

B.
Blowfish

C.
DSA

D.
Diffie-Hellman

E.
3DES