A server administrator discovers the web farm is using weak ciphers and wants to ensure that only stronger ciphers are accepted. Which of the following ciphers
should the administrator implement in the load balancer? (Select Two)

A.
SHA-192
B.
DES
C.
MD5
D.
RC4
E.
CRC-32
Answers are not correct:
The Secure Hash Algorithm (SHA) is one of a number of hash functions designed
by the U.S. National Security Agency (NSA) and published by the NIST. They are
used widely in the United States government. SHA-1 is the most commonly used
version, which employs a 160-bit hash, which is reasonably secure but uses a lot of
resources on the computer generating the hash. SHA-2 is more secure; it has 256-
bit and 512-bit block sizes but uses even more resources and is less widely accepted.
0
2