Pete, a security administrator, has implemented SSH across all network infrastructure devices in the enterprise. Which of the following protocols will be used to exchange keying material within SSH?

Pete, a security administrator, has implemented SSH across all network infrastructure devices in the enterprise. Which of the following protocols will be used to exchange keying material within SSH?






A. Transport layer protocol

B. IPSec

C. Diffie-Hellman

D. Secure socket layer





Answer: C


Computer Science

Learn More Multiple Choice Question :