ExamGecko
Question list
Search
Search

Question 495 - 350-701 discussion

Report
Export

DRAG DROP

Drag and drop the VPN functions from the left onto the description on the right.


Question 495
Correct answer: Question 495

Explanation:

The purpose of message integrity algorithms, such as Secure Hash Algorithm (SHA-1), ensures data has not been changed in transit. They use one way hash functions to determine if data has been changed.

SHA-1, which is also known as HMAC-SHA-1 is a strong cryptographic hashing algorithm, stronger than another popular algorithm known as Message Digest 5 (MD5). SHA-1 is used to provide data integrity (to guarantee data has not been altered in transit) and authentication (to guarantee data came from the source it was supposed to come from). SHA was produced to be used with the digital signature standard.

A VPN uses groundbreaking 256-bit AES encryption technology to secure your online connection against cyberattacks that can compromise your security. It also offers robust protocols to combat malicious attacks and reinforce your online identity.

IKE SAs describe the security parameters between two IKE devices, the first stage in establishing IPSec

asked 10/10/2024
Jonas Weimar
45 questions
User
0 comments
Sorted by

Leave a comment first