Which of the following can be used to institute a tunneling protocol for security?

The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol. Which of the following can be used to institute a tunneling protocol for security?

The term tunneling protocol is used to describe when one network protocol called the payload protocol is encapsulated within a different delivery protocol. Which of the following can be used to institute a tunneling protocol for security?

A.
FTP

B.
IPX/SPX

C.
IPSec

D.
EAP



Leave a Reply 0

Your email address will not be published. Required fields are marked *