What are two hashing algorithms used with IPsec to guarantee authenticity? (Choose two.)
- AES
- DH
- MD5
- RSA
- SHA
Explanation: The IPsec framework uses various protocols and algorithms to provide data confidentiality, data integrity, authentication, and secure key exchange. Two popular algorithms used to ensure that data is not intercepted and modified (data integrity and authentication) are MD5 and SHA.
Exam with this question: 8.4.2 Module Quiz - VPN and IPsec Concepts
Please login or Register to submit your answer