Which of the following protocols should be used for key… seenagape 8 years ago A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Whichof the following protocols should be used for key exchange? A. SHA-1 B. RC4 C. Blowfish D. Diffie-Hellman ← Previous question Next question →