Which of the following protocols should be used for key exchange? seenagape 9 years ago A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner.Which of the following protocols should be used for key exchange? A. SHA-1 B. RC4 C. Blowfish D. Diffie-Hellman ← Previous question Next question →