Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

IT Questions BankCategory: CCNA SecurityRefer to the exhibit. What HMAC algorithm is being used to provide data integrity?
Refer to the exhibit. What HMAC algorithm is being used to provide data integrity? 1ITExamAnswers Staff asked 5 months ago

Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?
Refer to the exhibit. What HMAC algorithm is being used to provide data integrity? 2

  • MD5
  • AES
  • SHA
  • DH

Explanation: Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. The command Router1(config-isakmp)# hash sha indicates that SHA is being used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm used for authentication.

More Questions: CCNA Security Chapter 8 Exam Answers
More Questions: Modules 18 – 19: VPNs Group Exam Answers


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments