Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
Home
Computational Fluid Dynamics
Which two types of encryption protocols can be used to secure the authentication of computers using...
0
votes
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?
a) SHA
b) Kerberos V5
c) Both SHA and MD5
d) MD5
encryption
protocols
Please
log in
or
register
to answer this question.
1
Answer
0
votes
answered
Mar 5, 2023
by
rajeshsharma
c) Both SHA and MD5
Related questions
0
votes
Q: IPsec defines two protocols: _______ and ________.
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
ipsec
protocols
0
votes
Q: Which two types of IPsec can be used to secure communications between two LANs?
asked
Mar 5, 2023
in
Computational Fluid Dynamics
by
rajeshsharma
communications
lan
0
votes
Q: What are the protocols used by Ajax?
asked
Jan 30
in
AJAX
by
rajeshsharma
protocols
0
votes
Q: Encryption can be reversed.
asked
May 10, 2022
in
Kerberos
by
sharadyadav1986
encryption
+1
vote
Q: Encryption algorithm is used to transforms plaintext into……………………….
asked
Sep 2, 2021
in
Cryptography
by
SakshiSharma
encryption
0
votes
Q: Can you explain what encryption is?
asked
May 14, 2023
in
JAVA
by
john ganales
encryption
0
votes
Q: Which of the following algorithm/encryption method is the safest to use?
asked
Mar 15, 2021
in
Secure Programming Practices
by
rajeshsharma
algorithm-secure
encryption
secure-programming-practices
0
votes
Q: Which of the following is the least strong security encryption standard?
asked
May 2, 2022
in
Cyber Security
by
sharadyadav1986
encryption
0
votes
Q: Explain the concept of encryption and decryption in Laravel.
asked
Oct 28, 2023
in
Laravel
by
Robindeniel
encryption
decryption
0
votes
Q: What do you understand by symmetric and asymmetric encryption?
asked
May 14, 2023
in
JAVA
by
john ganales
symmetric
asymmetric
encryption
...