Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, authentication types, key distribution algorithms, SA LifeDuration, etc.?

(A) Perform SMTP enumeration
(B) Perform DNS enumeration
(C) Perform IPsec enumeration
(D) Perform NTP enumeration

Respuesta :

Answer:

The answer is Letter C

Explanation:

The Perform IPsec enumeration. The Internet Protocol Security uses cryptographic security service to protect  data over Internet Protocol networks. IPsec supports network level peer authentication, data-origin authentication, data integrity,  data confidentiality , and replay protection.

ACCESS MORE
EDU ACCESS
Universidad de Mexico