Aswer D
https://www.cisco.com/c/en/us/support/docs/security-vpn/ipsec-negotiation-ike-protocols/116055-technote-ios-crypto.html
NGE algorithms are integrated into Internet Engineering Task Force (IETF), IEEE, and other international standards. As a result, NGE algorithms have been applied to the most recent and highly-secure protocols that protect user data, such as Internet Key Exchange Version 2 (IKEv2).
Types of cryptographic algorithms include:
Hash - Secure Hash Algorithms (SHA)-2 (SHA-256, SHA-384, and SHA-512)
This has to be a typo. I've never heard of SHA-2 and no reference to it anywhere. HMAC is the only feasible answer, if it really is meant to say SHA-2.
D is correct:
https://sec.cloudapps.cisco.com/security/center/resources/next_generation_cryptography
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Cokamaniako
11 months, 1 week agounclemonkeyboy
1 year agoPremium_Pils
4 months, 4 weeks agoTotosos1
1 year, 2 months ago