Computer Networks Snmpv3 User Based Security Model
Q Two algorithms are recommended in SNMPv3 for developing the key from the password. They are ______ and ______
  • A A. Triple des, rsa
  • B B. Block cipher algorithm, stream cipher algorithm
  • C C. . the second part in the designation is the bashing algorithm used, the first one being the mds hashing algorithm, and the second one the sha-1 hashing algorithm to generate mac.
  • D D. Hmac-mds-96, hmac-sha-96
Leave a Comment