Last Updated on April 30, 2021 by Admin
What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)
Answers Explanation & Hints:
The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authenticity) are MD5 and SHA.