GIAC Certified Perimeter Protection Analyst GPPA Question # 42 Topic 5 Discussion

GIAC Certified Perimeter Protection Analyst GPPA Question # 42 Topic 5 Discussion

GPPA Exam Topic 5 Question 42 Discussion:
Question #: 42
Topic #: 5

SSH is a network protocol that allows data to be exchanged between two networks using a secure channel.

Which of the following encryption algorithms can be used by the SSH protocol?

Each correct answer represents a complete solution. (Choose all that apply.)


A.

DES


B.

Blowfish


C.

RC4


D.

IDEA


Get Premium GPPA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.