A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?
A.
SHA-1
B.
RC4
C.
Blowfish
D.
Diffie-Hellman
A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?
A network engineer is configuring a VPN tunnel connecting a company’s network to a business
partner. Which of the following protocols should be used for key exchange?
A.
SHA-1
B.
RC4
C.
Blowfish
D.
Diffie-Hellman
Answer is D
http://www.cisco.com/c/en/us/support/docs/security/vpn-5000-series-concentrators/14130-ike.html#key
Diffie Hellmen (an Asymmetric system) was created for the purpose of exchanging symmetric keys from one system to another. It is D.