Encapsulating IP packets inside another protocol, like frame relay, to pass them over a wide area network, and removing them from this protocol at the other end, is known as

a. routing
b. bridging
c. tunneling
d. none of the above

c. tunneling

Computer Science & Information Technology

You might also like to view...

Which of the following web server attacks can uncover passwords, web design, or business logic?

a. Buffer overflow attack b. Source disclosure attack c. File system traversal attack d. Vulnerability attack

Computer Science & Information Technology

________ was the communication medium of choice for early computer criminals

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology