A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which
of the following protocols should be used for key exchange?
A.
SHA-1
B.
RC4
C.
Blowfish
D.
Diffie-Hellman
A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which
of the following protocols should be used for key exchange?
A network engineer is configuring a VPN tunnel connecting a company’s network to a business partner. Which
of the following protocols should be used for key exchange?
A.
SHA-1
B.
RC4
C.
Blowfish
D.
Diffie-Hellman