Which is the correct order of the SSH Transport Layer Protocol Packet Exchanges?
(a) Algorithm Negotiation; End of key exchange; Service request; Identification string exchange
(b) Identification string exchange; Algorithm Negotiation; End of key exchange; Service request
(c) Identification string exchange; End of key exchange; Service request; Algorithm Negotiation
(d) Algorithm Negotiation; Identification string exchange; End of key exchange; Service request
The question was posed to me in class test.
Query is from Overview in chapter Wireless Network Security and Network Security Overview of Cryptograph & Network Security