VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.
A. a port number
B. IP source and destination information
C. a user name
D. a protocol
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following is an interactive Excel report that summarizes and analyzes data, such as database records from various sources, including those that are external to Excel?
A) PivotTable report B) PivotRow report C) PivotSection report D) PivotChart report
Computer Science & Information Technology
Which key is used to stop debugging?
A. F5 B. Shift-F5 C. F11 D. Ctrl-F10
Computer Science & Information Technology