PrepAway - Latest Free Exam Questions & Answers

2 Comments on “Which of the following protocols should be used for key exchange?

  1. SecurityGuy says:

    The answer is D

    Session Negotiation

    From Cisco document
    During session negotiation, IKE allows parties to negotiate how they will conduct authentication and how they will protect any future negotiations (that is, IPSec tunnel negotiation). These items are negotiated:

    Authentication method – This is one of the methods listed in the Authentication section of this document.

    Key exchange algorithm – This is a mathematical technique for securely exchanging cryptographic keys over a public medium (Diffie-Hellman). The keys are used in the encryption and packet-signature algorithms.




    0



    0
  2. IThelper says:

    It’s D.

    Diffie-Hellman is an algorithm used to establish a shared secret between two parties. It is primarily used as a method of exchanging cryptography keys for use in symmetric encryption algorithms like AES. The algorithm in itself is very simple




    0



    0

Leave a Reply