A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?

IT Questions BankCategory: Cybersecurity EssentialsA user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?

A user has been asked to implement IPsec for inbound external connections. The user plans to use SHA-1 as part of the implementation. The user wants to ensure the integrity and authenticity of the connection. What security tool can the user use?

  • HMAC
  • SHA256
  • ISAKMP
  • MD5

Explanation: HMAC provides the additional feature of a secret key to ensure integrity and authentication.

Exam with this question: Cybersecurity Essentials Chapter 5 Quiz Answers
Exam with this question: Network Defense - 3.5.2 Module 3: Access Control Quiz

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments