SHA corresponds to hash which in the case of ISAKMP/IPSec policies will always relate to integrity. "Specifies the hash algorithm used to ensure data integrity. It ensures that a packet comes from where it says it comes from, and that it has not been modified in transit."
https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/ike.html
The same concept is used to verify file integrity e.g. firmware files. Good to check the firmware SHA/MD5 checksums, prior to applying/rebooting, so you don't end up bricking your device.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
jku2cya
10 months, 4 weeks ago