AH and ESP Protocols Interview/Exam Question-Answer
Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? A. SHA B. Kerberos V5 C. Both SHA and MD5 D. MD5 Ans : Both SHA and MD5 Q.2 Which mode of IPsec should you use …
AH and ESP Protocols Interview/Exam Question-Answer Read More »