Which of the following protocols are used for tunneling and encryption purposes?
A. L2TP
B. PAP
C. SLIP
D. PPPoE
E. IPSec
Answer:
A. L2TP
E. IPSec
Computer Science & Information Technology
You might also like to view...
Which of the following words does NOT describe a characteristic of SharePoint?
A) individualized B) secure C) centralized D) online
Computer Science & Information Technology
A ______ of height h is full down to level h – 1, with level h filled in from left to right.
a. full binary tree b. complete binary tree c. balanced binary tree d. general tree
Computer Science & Information Technology