With which technology do apply integrity, confidentially and authenticate the source

Posted by: Pdfprep Category: 210-260 Tags: , ,

With which technology do apply integrity, confidentially and authenticate the source
A . IPSec
B . IKE
C . Certificate authority
D . Data encryption standards

Answer: A

Explanation:

IPsec is a collection of protocols and algorithms used to protect IP packets at Layer 3 (hence the name of IP Security [IPsec]). IPsec provides the core benefits of confidentiality through encryption, data integrity through hashing and HMAC, and authentication using digital signatures or using a pre-shared key (PSK) that is just for the authentication, similar to a password.

Source: Cisco Official Certification Guide, IPsec and SSL, p.97

Leave a Reply

Your email address will not be published.