Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

IT Questions BankCategory: CCNA SecurityRefer to the exhibit. What HMAC algorithm is being used to provide data integrity?

Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?

  • MD5
  • AES
  • SHA
  • DH

Explanation: Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. The command Router1(config-isakmp)# hash sha indicates that SHA is being used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm used for authentication.

Exam with this question: CCNA Security Chapter 8 Exam Answers
Exam with this question: Checkpoint Exam: VPNs Group Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments