What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel?

What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel? (Choose two)

What algorithm technology must be used for ensuring data integrity when dataflow goes over VPN tunnel? (Choose two)

A.
RSA

B.
DH-1

C.
DH-2

D.
HMAC-MD5

E.
HMAC-SHA1



Leave a Reply 0

Your email address will not be published. Required fields are marked *