What is the most appropriate setting to comply with theses requirements?

Multi-corp must comply with industry regulations in implementing VPN solutions among Multiple defines the following requirements:

Portability: Standard
Key management: Automatic, external PKI
Session keys: changed at configured times during a connection’s lifetime
Key length: No less than 128-bit
Data integrity: Secure against inversion and brute-force attacks

What is the most appropriate setting to comply with theses requirements?

Multi-corp must comply with industry regulations in implementing VPN solutions among Multiple defines the following requirements:

Portability: Standard
Key management: Automatic, external PKI
Session keys: changed at configured times during a connection’s lifetime
Key length: No less than 128-bit
Data integrity: Secure against inversion and brute-force attacks

What is the most appropriate setting to comply with theses requirements?

A.
IKE VPNs: SHA1 encryption for IKE Phase 1, and MD5 encryption for phase 2, AES hash

B.
IKE VPNs: DES encryption for IKE phase 1, and 3DES encryption for phase 2, MD 5 hash

C.
IKE VPNs: CAST encryption for IKE Phase 1, and SHA 1 encryption for phase 2, DES hash

D.
IKE VPNs: AES encryption for IKE Phase 1, and MD5 encryption for phase 2, SHA 1 hash



Leave a Reply 4

Your email address will not be published. Required fields are marked *


Nishanth Javvadi

Nishanth Javvadi

ans is D because AES is the best standard

Oleksandr

Oleksandr

The only possible answer is “B”.
“D” cannot be because MD5 is not encryption but hash.

Bruno

Bruno

I believe the question isn’t done correctly. Either answer is correct.
SHA1 is an hash algorithm excluding A and C;
DES is 56 Bits algorithm, excluding B;
MD5 is an hash algorithm too, excluding D.

mr_tienvu

mr_tienvu

I agree with the answer. B