DRAG DROP 07/03/2019 – by Mod_GuideK 1 DRAG DROP Drag the hash or algorithm from the left column to it’s appropriate category on the right. Select and Place: SHOW ANSWERSCorrect Answer: Explanation/Reference: Reference: https://www.cisco.com/c/en/us/about/security-center/next-generation-cryptography.html
Avoid: DES, MD5.
Legacy: 3DES, HMAC-MD5,
Acceptable: SHA-1