A network engineer is configuring a VPN tunnel connecting a company's network to a business partner. Which of the following protocols should be used for key exchange?
A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman
Answer: A. SHA-1
Computer Science & Information Technology
You might also like to view...
Class ________ represents a dynamically resizable array-like data structure.
a. Array b. ArrayList c. Arrays d. None of the above.
Computer Science & Information Technology
Users can quickly open the Edit Relationships dialog box from the Relationships window by double-clicking on the ________ line
A) link B) tag C) join D) anchor
Computer Science & Information Technology
There is no way to verify that the correct records will be updated when using an update query
Indicate whether the statement is true or false
Computer Science & Information Technology
Right-click a slide in the Thumbnails pane and then click ____ to create an exact copy of a slide.
A. Copy Slide B. Duplicate Slide C. Exact Copy D. Mimic Slide
Computer Science & Information Technology