Computer Networks Experienced
Q Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
  • A A. Kerberos v5
  • B B. Sha
  • C C. Md5
  • D D. Both sha and md5
Leave a Comment