A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which of the following protocols should be used for key exchange?
A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman
2 Comments on “Which of the following protocols should be used for key exchange?”
Answer is D
http://www.cisco.com/c/en/us/support/docs/security/vpn-5000-series-concentrators/14130-ike.html#key
0
0
Diffie Hellmen (an Asymmetric system) was created for the purpose of exchanging symmetric keys from one system to another. It is D.
0
0