A network engineer is configuring a VPN tunnel connecting a company's network to a business partner. Which of the following protocols should be used for key exchange?
A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman
Answer: A. SHA-1
Computer Science & Information Technology
You might also like to view...
The default alignment for text in a new document is Align Text Left.
a. true b. false
Computer Science & Information Technology
Application banner information is typically recorded during what penetration testing phase?
A. Planning B. Attack C. Reporting D. Discovery
Computer Science & Information Technology