85.8k views
0 votes
Which of the following steps in enumeration penetration testing extracts information about encryption and hashing algorithms, authentication types, key distribution algorithms, SA LifeDuration, etc.?

(A) Perform SMTP enumeration
(B) Perform DNS enumeration
(C) Perform IPsec enumeration
(D) Perform NTP enumeration

User Dree
by
5.6k points

1 Answer

6 votes

Answer:

The answer is Letter C

Step-by-step explanation:

The Perform IPsec enumeration. The Internet Protocol Security uses cryptographic security service to protect data over Internet Protocol networks. IPsec supports network level peer authentication, data-origin authentication, data integrity, data confidentiality , and replay protection.

User Crunchdog
by
6.4k points