A server administrator discovers the web farm is using weak ciphers and wants to ensure that only
stronger ciphers are accepted. Which of the following ciphers should the administrator implement in the
load balancer? (Select Two)

A.
SHA-129
B.
DES
C.
MD5
D.
RC4
E.
CRC-32
What is SHA-129? Should this read SHA-128 (SHA2) ?
0
0
Advanced Encryption Standard (AES) An encryption standard used with WPA and
WPA2. The successor to DES/3DES and is another symmetric key encryption standard
composed of three different block ciphers: AES-128, AES-192, and AES-256.
RC4 Rivest Cipher version 4 128-bit typical
DES Data Encryption Standard 56-bit
The Message-Digest algorithm 5 (MD5) is the newest of a series of algorithms
designed by Ron Rivest. It uses a 128-bit key. This is a widely used hashing algorithm;
at some point you have probably seen MD5 hashes when downloading files.
This is an example of the attempt at providing integrity. By checking the hash produced
by the downloaded file against the original hash, you can verify the file’s integrity
with a level of certainty. However, MD5 hashes are susceptible to collisions.
A collision occurs when two different files end up using the same hash. Due to this
low collision resistance, MD5 is considered to be harmful today. MD5 is also vulnerable
to threats such as rainbow tables and pre-image attacks. The best solution
to protect against these attacks is to use a stronger type of hashing function such as
SHA-2 or higher.
The SHA-2 family consists of six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
Don’t know what CRC means
0
0