A.SPAP B.CHAP C.DHCHAP D.ESP
A.Only symmetric algorithms have a key exchange technology built in B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms C.Only asymmetric algorithms have a key exchange technology built in D.Asymmetric algorithms are based on more complex mathematical computations
A.Pass B.Flow C.Allow D.Inspect