in Technology by

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

       A. SHA

       B. Kerberos V5

       C. Both SHA and MD5

       D. MD5

1 Answer

0 votes
by

Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?

Ans : Both SHA and MD5

Related questions

0 votes
    Which two types of IPsec can be used to secure communications between two LANs? A. ESP tunnel mode B. AH tunnel mode ... transport mode D. Both AH tunnel mode and ESP tunnel mode...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    IPsec defines two protocols: _______ and ________. A. PGP; ESP B. AH; SSL A. PGP; SSL B. AH; ESP...
asked Mar 12, 2023 in Technology by JackTerrance
0 votes
    NiFi allows stable exchange through the use of protocols which have ________ encryption. (1)None of the options (2)All the options (3)2-way-ssl (4)1-way-ssl...
asked Apr 20, 2021 in Technology by JackTerrance
0 votes
    It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure. (a) True ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    _____________ is an encryption program or add-ons which provides cryptographic privacy & authentication for email ... Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    What types of protocols are used in VPNs? (a) Application level protocols (b) Tunnelling protocols (c) Network ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 4, 2021 in Education by JackTerrance
0 votes
    Even with two-factor authentication, users may still be vulnerable to_____________attacks. (a) Radiant (b) ... in portion Database Programming Techniques of Database Management...
asked Oct 10, 2021 in Education by JackTerrance
0 votes
    Which among the following may be addressed using message authentication? (1)Content modification (2)Sequence modification (3)All the options (4)Timing modification (5)Masquerade...
asked Mar 19, 2021 in Technology by JackTerrance
0 votes
    What type of authentication attackers can detect via manual means and exploit them, using automated tools with password lists and dictionary attacks?...
asked Mar 20, 2021 in Technology by JackTerrance
0 votes
    Which are the two functions that are not allowed in any secure subset? (a) evaluate() and restrict( ... Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Oct 23, 2021 in Education by JackTerrance
...