Notifications
Clear all
Topic starter
In the SSH algorithm negotiation phase, the two parties exchange the list of algorithms they support.
The symmetric encryption algorithm list of the SSH server is: aes256-ctr, aes192-ctr, aes128-ctr, aes256-cbc.
The list of symmetric encryption algorithms of the SSH client is: aes128-c9-ctr, aes256-ctr, aes256-cbc.
Which of the following is the symmetric encryption algorithm that both parties will use?
- A . aes128-ctr
B. aes192-ctr
C. aes256-cbc
D. aes256-ctr
Suggested Answer: A
Posted : 14/11/2022 9:14 pm