SY0-401 question 1402 discussion

answered

A network engineer is configuring a VPN tunnel connecting a companys network to a
business partner. Which of the following protocols should be used for key exchange?

  • A. SHA-1
  • B. RC4
  • C. Blowfish
  • D. Diffie-Hellman
Created 4 months, 1 week ago by Hchen

Hchen

The answer is D.