Computer networks use a tunneling protocol when one network protocol (the delivery protocol) encapsulates a different payload protocol. Encryption is especially important in wireless communications. Refer to the following protocols, which two are applicable to tunneling and encryptionpurposes? (Select TWO).
A.
L2TP
B.
IPSec
C.
SLIP
D.
PPPoE