A company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task?

IT Questions BankCategory: CCNA CyberOpsA company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task?
A company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task? 1ITExamAnswers Staff asked 9 months ago

A company is developing a security policy to ensure that OSPF routing updates are authenticated with a key. What can be used to achieve the task?

  • SHA-1
  • HMAC
  • AES
  • MD5
  • 3DES

Explanation: The task to ensure that routing updates are authenticated is data origin authentication, which can be implemented using HMAC. HMAC is MD5 or SHA-1 plus a secret key. AES and 3DES are two encryption algorithms. MD5 and SHA-1 can be used to ensure data integrity, but not authentication.

More Questions: CCNA Cyber Ops Chapter 9 Exam Answers[signinlocker]


Related Articles