Refer to the exhibit. What HMAC algorithm is being used to provide data integrity?
- MD5
- AES
- SHA
- DH
Explanation: Two popular algorithms that are used to ensure that data is not intercepted and modified (data integrity) are MD5 and SHA. The command Router1(config-isakmp)# hash sha indicates that SHA is being used. AES is an encryption protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm that is used for key exchange. RSA is an algorithm used for authentication.
Exam with this question: CCNA Security Chapter 8 Exam Answers
Exam with this question: Checkpoint Exam: VPNs Group Exam Answers
Please login or Register to submit your answer