A network engineer is configuring a VPN tunnel connecting a company's network to a business partner. Which of the following protocols should be used for key exchange?

A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman

Answer: A. SHA-1

Computer Science & Information Technology

You might also like to view...

The default alignment for text in a new document is Align Text Left.

a. true b. false

Computer Science & Information Technology

Application banner information is typically recorded during what penetration testing phase?

A. Planning B. Attack C. Reporting D. Discovery

Computer Science & Information Technology