Which of the following protocols are used for tunneling and encryption purposes?

A. L2TP
B. PAP
C. SLIP
D. PPPoE
E. IPSec

Answer:
A. L2TP
E. IPSec

Computer Science & Information Technology

You might also like to view...

Which of the following words does NOT describe a characteristic of SharePoint?

A) individualized B) secure C) centralized D) online

Computer Science & Information Technology

A ______ of height h is full down to level h – 1, with level h filled in from left to right.

a. full binary tree b. complete binary tree c. balanced binary tree d. general tree

Computer Science & Information Technology