You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints?
A. Point-to-Point Protocol
B. Point-to-Point Tunneling Protocol
C. Layer Two Tunneling Protocol
D. Secure Socket Tunneling Protocol
Answer: D
Computer Science & Information Technology
You might also like to view...
When changing column widths, best results are obtained when starting at the right side of the table
Indicate whether the statement is true or false
Computer Science & Information Technology
The horizontal and vertical lines that intersect to create cells are called ________
A) gridlines B) cell margins C) cell borders D) headers
Computer Science & Information Technology