VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.

A. a port number
B. IP source and destination information
C. a user name
D. a protocol

Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is an interactive Excel report that summarizes and analyzes data, such as database records from various sources, including those that are external to Excel?

A) PivotTable report B) PivotRow report C) PivotSection report D) PivotChart report

Computer Science & Information Technology

Which key is used to stop debugging?

A. F5 B. Shift-F5 C. F11 D. Ctrl-F10

Computer Science & Information Technology