CompTIA Network+ Practice Test 2026 - Free Network+ Practice Questions and Exam Prep Guide

Question: 1 / 675

Which hashing algorithms are commonly used with the Authentication Header (AH)?

SHA-1, SHA-2, and RSA

MD5, SHA-1, or SHA-2

Hashing algorithms are critical in ensuring data integrity and authenticity, especially within network security protocols like the Authentication Header (AH). The Authentication Header is part of the IPsec suite and is used to provide authentication and integrity for IP packets.

The correct choice identifying commonly used hashing algorithms with the Authentication Header includes MD5, SHA-1, and SHA-2. Each of these algorithms serves the function of generating a hash value, which is a fixed-size string of characters that serves as a unique identifier for the original data. This allows the receiving end to confirm that the data has not been tampered with during transit.

MD5, while not considered secure against collision attacks, was widely used in the past for its speed and simplicity. SHA-1, which is an improvement over MD5 in terms of security, is also now viewed as weak due to vulnerabilities discovered over recent years. Consequently, SHA-2 has gained acceptance as a more secure alternative, offering stronger hash functions with support for larger hash sizes, making it suitable for modern applications.

Using this combination of hashing algorithms allows network protocols to verify the integrity and authenticity of the transmitted packets effectively. In contrast, other options refer to encryption algorithms or methods that serve different purposes. AES and 3DES,

Get further explanation with Examzify DeepDiveBeta

AES and 3DES

Blowfish and Serpent

Next Question

Report this question

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy