What are the SHA hash generating algorithms used for?

IT Questions BankCategory: CCNA 3 v7What are the SHA hash generating algorithms used for?

What are the SHA hash generating algorithms used for?

  • Authentication
  • Confidentiality
  • Integrity
  • Nonrepudiation

Explanation: Integrity is ensured by implementing SHA hash generating algorithms. Many modern networks ensure authentication with protocols such as HMACs. Data confidentiality is ensured through symmetric encryption algorithms, including 3DES and AES. Data confidentiality can also be ensured using asymmetric algorithms.

Exam with this question: 3.11.3 Module Quiz - Network Security Concepts

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments