What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel? (Choose two)
A.
RSA
B.
DH-1
C.
DH-2
D.
HMAC-MD5
E.
HMAC-SHA1
What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel? (Choose two)
What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel? (Choose two)
A.
RSA
B.
DH-1
C.
DH-2
D.
HMAC-MD5
E.
HMAC-SHA1