**What is the purpose of the DH algorithm?**

- to provide nonrepudiation support
**to generate a shared secret between two hosts that have not communicated before**- to encrypt data traffic after a VPN is established
- to support email data confidentiality

**Explanation:** DH is an asymmetric mathematical algorithm that allows two computers to generate an identical shared secret, without having communicated before. Asymmetric key systems are extremely slow for any sort of bulk encryption. It is common to encrypt the bulk of the traffic using a symmetric algorithm such as DES, 3DES, or AES, and use the DH algorithm to create keys that will be used by the symmetric encryption algorithm.

** Exam with this question: Modules 21 - 23: Cryptography and Endpoint Protection Group Exam**

** Exam with this question: CCNA Cyber Ops Chapter 9 Exam Answers**

** Exam with this question: Module 16: Quiz – Basic Integrity and Authenticity Network Security**

** Exam with this question: Network Defense 8.8.2 Module 8: Public Key Cryptography Quiz**

** Exam with this question: Network Defense - My Knowledge Check Answers**

Please login or Register to submit your answer