Computer networks use a tunneling protocol when one network protocol (the delivery protocol)
encapsulates a different payload protocol. Which one of the following network techniques is
involved in the secure tunneling?
A.
PPPoE
B.
PPP
C.
PAP
D.
SSL VPN