Encapsulating IP packets inside another protocol, like frame relay, to pass them over a wide area network, and removing them from this protocol at the other end, is known as
a. routing
b. bridging
c. tunneling
d. none of the above
c. tunneling
Computer Science & Information Technology
You might also like to view...
Which of the following web server attacks can uncover passwords, web design, or business logic?
a. Buffer overflow attack b. Source disclosure attack c. File system traversal attack d. Vulnerability attack
Computer Science & Information Technology
________ was the communication medium of choice for early computer criminals
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology