A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?
- HMAC
- SHA256
- ISAKMP
- MD5
Explanation: HMAC provides the additional feature of a secret key to ensure integrity and authentication.
Exam with this question: Cybersecurity Essentials Chapter 5 Quiz Answers
Exam with this question: Network Defense - 3.5.2 Module 3: Access Control Quiz
Please login or Register to submit your answer