Identify two tunneling protocols that can be used to configure a remote user’s PC.

What will be an ideal response?

PPTP (Point-To-Point Tunnel Protocol)
L2TP (Layer 2 Tunneling Protocol)

Computer Science & Information Technology

You might also like to view...

To be successful with using ________ tools, keep them up to date and relevant to your customers

A) IaaS B) hashtags C) social media D) Google

Computer Science & Information Technology

The Internet uses two IP addressing schemes: IPv4 and IPv6.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology