in Technology by

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

       A. SHA

       B. Kerberos V5

       C. Both SHA and MD5

       D. MD5

1 Answer

0 votes
by

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Ans : Both SHA and MD5

Related questions

0 votes
    Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
asked Mar 11 in Technology by JackTerrance
0 votes
    IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
asked Mar 11 in Technology by JackTerrance
0 votes
    NiFi allows stable exchange through the use of protocols which have ________ encryption. (1)None of the options (2)All the options (3)2-way-ssl (4)1-way-ssl...
asked Apr 20, 2021 in Technology by JackTerrance
0 votes
    It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure. (a) True ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    What types of protocols are used in VPNs? (a) Application level protocols (b) Tunnelling protocols (c) Network ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    There are ________ types of VPN protocols. (a) 3 (b) 4 (c) 5 (d) 6 This question was addressed to me ... bank, Cyber Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    State True or False: MS Access is a Database Management System. 2 Database is of two types, DBMS and RDBMS. 3 ... called a field name. Select the correct answer from above options...
asked Nov 26, 2021 in Education by JackTerrance
0 votes
    Even with two-factor authentication, users may still be vulnerable to_____________attacks. (a) Radiant (b) ... in portion Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    There are __________ types of wireless authentication modes. (a) 2 (b) 3 (c) 4 (d) 5 I had been ... ?,Need-for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which among the following may be addressed using message authentication? (1)Content modification (2)Sequence modification (3)All the options (4)Timing modification (5)Masquerade...
asked Mar 19, 2021 in Technology by JackTerrance
...