1.Which protocol is used a framework for the negotiation and management of security associations between peers?
SHOW ANSWER2.Which mechanism responsible for key agreement using asymmetric cryptography?
SHOW ANSWER3.Which mechanism to provides data encryption, data integrity, and peer authentication?
SHOW ANSWER4.Define authentication header?
SHOW ANSWER5.Encryption algorithm of IPSec
SHOW ANSWER6. Hashing algorithm of IPSec
SHOW ANSWER7. What is data integrity?
SHOW ANSWER8. Define anti-reply
SHOW ANSWER9. What is the length of MD5 hashing algorithm?
SHOW ANSWER10. What is the strength of MD5 hashing algorithm?
SHOW ANSWER11. What is the strength of SHA-1 hashing algorithm?
SHOW ANSWER