which two are applicable to tunneling and encryptionpurposes?

Computer networks use a tunneling protocol when one network protocol (the delivery protocol)
encapsulates a different payload protocol. Encryption is especially important in wireless
communications. Refer to the following protocols, which two are applicable to tunneling and
encryptionpurposes? (Select TWO).

Computer networks use a tunneling protocol when one network protocol (the delivery protocol)
encapsulates a different payload protocol. Encryption is especially important in wireless
communications. Refer to the following protocols, which two are applicable to tunneling and
encryptionpurposes? (Select TWO).

A.
L2TP

B.
IPSec

C.
SLIP

D.
PPPoE



Leave a Reply 0

Your email address will not be published. Required fields are marked *