What is the hash value length of the Secure Hash Algorithm (SHA-1)?
Peter works as a Network Administrator for Net World Inc. The company wants to allow remote users to connect and access its private network through a dial-up connection via the Internet. All the data will be sent across a public network. For security reasons, the management wants the data sent through the Internet to be encrypted. The company plans to use a Layer 2 Tunneling Protocol (L2TP) connection. Which communication protocol will Peter use to accomplish the task?
Which of the following performs packet screening for security on the basis of port numbers?
Which of the following is used by the Diffie-Hellman encryption algorithm?