You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.
Which algorithm should you use?
A.
SHA-512
B.
SHA-256
C.
MD5-Plus
D.
MD5
You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.
Which algorithm should you use?
You are asked to implement the hashing algorithm that uses the most bits in the calculation on
your Junos security device.
Which algorithm should you use?
A.
SHA-512
B.
SHA-256
C.
MD5-Plus
D.
MD5
SHA-2: A family of two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-bit words where SHA-512 uses 64-bit words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.
http://www.juniper.net/documentation/en_US/junos13.2/topics/task/configuration/services-ike-proposals-configuring.html
[edit services ipsec-vpn ike proposal proposal-name]
authentication-algorithm (md5 | sha1 | sha-256);