What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

Last Updated on June 17, 2021 by Admin

What are two hashing algorithms used with IPsec AH to guarantee authenticity? (Choose two.)

  • RSA
  • AES
  • MD5
  • DH
  • SHA
    Answers Explanation & Hints:

    The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authenticity) are MD5 and SHA.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments