SY0-401 question 1402 discussion


A network engineer is configuring a VPN tunnel connecting a companys network to a
business partner. Which of the following protocols should be used for key exchange?

  • A. SHA-1
  • B. RC4
  • C. Blowfish
  • D. Diffie-Hellman
Created 6 months, 1 week ago by Hchen


The answer is D.


The answer is D....SHA-1 is a hashing algorithm, not an encryption protocol