Identify two tunneling protocols that can be used to configure a remote user’s PC.
What will be an ideal response?
PPTP (Point-To-Point Tunnel Protocol)
L2TP (Layer 2 Tunneling Protocol)
Computer Science & Information Technology
You might also like to view...
To be successful with using ________ tools, keep them up to date and relevant to your customers
A) IaaS B) hashtags C) social media D) Google
Computer Science & Information Technology
The Internet uses two IP addressing schemes: IPv4 and IPv6.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology