You have been tasked with implementing a VPN server that will allow clients to connect from mobile networks and from networks that utilize restrictive firewalls. What VPN tunneling protocol has be best chance to be successful, given the constraints?

A. Point-to-Point Protocol
B. Point-to-Point Tunneling Protocol
C. Layer Two Tunneling Protocol
D. Secure Socket Tunneling Protocol

Answer: D

Computer Science & Information Technology

You might also like to view...

When changing column widths, best results are obtained when starting at the right side of the table

Indicate whether the statement is true or false

Computer Science & Information Technology

The horizontal and vertical lines that intersect to create cells are called ________

A) gridlines B) cell margins C) cell borders D) headers

Computer Science & Information Technology