A security administrator needs to implement a technology that creates a secure key exchange. Neither
party involved in the key exchange will have pre-existing knowledge of one another. Which of the
following technologies would allow for this?

A.
Blowfish
B.
NTLM
C.
Diffie-Hellman
D.
CHAP