A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing
knowledge of one another. Which of the following technologies would allow for this?

A.
Blowfish
B.
NTLM
C.
Diffie-Hellman
D.
CHAP