A network engineer is configuring a VPN tunnel connecting a company's network to a business partner. Which of the following protocols should be used for key exchange?

A. SHA-1
B. RC4
C. Blowfish
D. Diffie-Hellman


Answer: A. SHA-1

Computer Science & Information Technology

You might also like to view...

Class ________ represents a dynamically resizable array-like data structure.

a. Array b. ArrayList c. Arrays d. None of the above.

Computer Science & Information Technology

Users can quickly open the Edit Relationships dialog box from the Relationships window by double-clicking on the ________ line

A) link B) tag C) join D) anchor

Computer Science & Information Technology

There is no way to verify that the correct records will be updated when using an update query

Indicate whether the statement is true or false

Computer Science & Information Technology

Right-click a slide in the Thumbnails pane and then click ____ to create an exact copy of a slide.

A. Copy Slide B. Duplicate Slide C. Exact Copy D. Mimic Slide

Computer Science & Information Technology