PrepAway - Latest Free Exam Questions & Answers

Which of the following protocols should be used for key exchange?

A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?

PrepAway - Latest Free Exam Questions & Answers

A.
SHA-1

B.
RC4

C.
Blowfish

D.
Diffie-Hellman

2 Comments on “Which of the following protocols should be used for key exchange?


Leave a Reply