The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol. Which of the following can be used to institute a tunneling protocol for security?
A.
FTP
B.
IPX/SPX
C.
IPSec
D.
EAP