• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

Network Security (Version 1) - Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 01
Network Security (Version 1) – Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 01
  • SHA
  • MD5
  • DH
  • AES
    Answers Explanation & Hints:

    Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. The command Router1(config-isakmp)# hash sha indicates that SHA is being used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm used for authentication.

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments