Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?
A. Temporal Key Integrity Protocol (TKIP)
B. Secure Hash Algorithm (SHA)
C. Secure Shell (SSH)
D. Transport Layer Security (TLS)

Download Printable PDF. VALID exam to help you PASS.

5 thoughts on “Which of the following adds end-to-end security inside a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

  1. Keyword:

    Which of the following adds end-to-end security **inside** a Layer 2 Tunneling Protocol (L2TP) Internet Protocol Security (IPSec) connection?

    IPsec tunnels use *keyed-hash message authentication code (HMAC) versions of these algorithms. While vanilla MD5 has been proven broken, HMAC-MD5 is still considered secure.*

    which of the following is HASH? only SHA

  2. B. SHA is correct because IPSEC is mentioned in the question. IPSEC already adds confidentality. Note, they do not say “Confidentiality” but rather, they say adds “Security” when implies the entire CIA Triade.

    You need the SHA Hash to verify that you are communicating with the correct person and prevent Man-In-The-Middle attacks.

    IPsec VPNs connect hosts or networks to a protected private network but it doesn’t guarantee End-To-End because without a SHA Hash to validate the person on the other end, you can’t say for certain that a Third-Party Provider is opening that traffic, re-encrypting it, and sending it to the desired destination. I.E. Man-In-The-Middle

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.