MCQs City stays free thanks to ads. Please turn off your ad blocker for this site so content and features keep working.
Computer Networks
Experienced
Q
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
AA. Kerberos v5
BB. Sha
CC. Md5
DD. Both sha and md5
Correct Answer:
D. D. Both sha and md5
Explanation:
SHA or MD5 can be used. Kerberos V5 is an authentication protocol, not an encryption protocol; therefore, answer A is incorrect. Certificates are a type of authentication that can be used with IPsec, not an encryption protocol; therefore, answer B is incorrect.