CompTIA Security+ Question J-11

A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which of the following protocols should be used for key exchange?

A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman

Answer: A