CompTIA Security Plus Mock Test Q1174

A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which of the following protocols should be used for key exchange?

A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman

Correct Answer: A
Section: Mixed Questions