nerdexam
CiscoCisco

350-701 · Question #293

350-701 Question #293: Real Exam Question with Answer & Explanation

The correct answer is D: SHA-2. NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. An algorithm that would be secure even after a quantum-computer is built is said to have postquantum security or be quan

Submitted by tyler.j· Mar 30, 2026Domain list not provided in prompt

Question

Which algorithm is an NGE hash function?

Options

  • AHMAC
  • BSHA-1
  • CMD5
  • DSHA-2

Explanation

NGE was created to define a widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance for our customers. An algorithm that would be secure even after a quantum-computer is built is said to have postquantum security or be quantum-computer resistant (QCR). AES-256, SHA-384 and SHA-512 are believed to be postquantum secure. SHA-2 (Secure Hash Algorithm 2), of which SHA-256 is a part, is one of the most popular hash algorithms around. A cryptographic hash, also often referred to as a “digest”, “fingerprint” or “signature”, is an almost perfectly unique string of characters that is generated from a separate piece of input text. SHA-256 generates a 256-bit (32-byte) signature. https://blogs.cisco.com/security/cisco-next-generation-encryption-and-postquantum-cryptography

Topics

#NGE#Hash algorithms#SHA-2

Community Discussion

No community discussion yet for this question.

Full 350-701 PracticeBrowse All 350-701 Questions