exam questions

Exam 350-701 All Questions

View all questions & answers for the 350-701 exam

Exam 350-701 topic 1 question 471 discussion

Actual exam question from Cisco's 350-701
Question #: 471
Topic #: 1
[All 350-701 Questions]

What is provided by the Secure Hash Algorithm in a VPN?

  • A. authentication
  • B. encryption
  • C. integrity
  • D. key exchange
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
jku2cya
10 months, 4 weeks ago
Selected Answer: C
SHA corresponds to hash which in the case of ISAKMP/IPSec policies will always relate to integrity. "Specifies the hash algorithm used to ensure data integrity. It ensures that a packet comes from where it says it comes from, and that it has not been modified in transit." https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/ike.html The same concept is used to verify file integrity e.g. firmware files. Good to check the firmware SHA/MD5 checksums, prior to applying/rebooting, so you don't end up bricking your device.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...