Question 85:
SSH is a network protocol that allows data to be exchanged between two networks using a secure channel. Which of the following encryption algorithms can be used by the SSH protocol? Each correct answer represents a complete solution. Choose all that apply.
Answer options:
A. Blowfish B. DES C. IDEA D. RC4