1.

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?(a) Kerberos V5(b) SHA(c) MD5(d) Both SHA and MD5This question was addressed to me in homework.My question is based upon AH and ESP Protocols topic in section Transport Layer of Computer Network

Answer»

Correct OPTION is (d) Both SHA and MD5

To elaborate: SHA or MD5 can be used. Kerberos V5 is an authentication PROTOCOL, not an ENCRYPTION protocol; therefore, answer A is incorrect. CERTIFICATES are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.



Discussion

No Comment Found

Related InterviewSolutions