What open-source VPN protocol utilizes OpenSSL for encryption and has the ability to possibly cross firewalls where IPsec might be blocked?

a. Layer 2 Tunneling Protocol (L2TP)
b. Point-to-Point Tunneling Protocol (PPTP)
c. Generic Routing Encapsulation (GRE)
d. OpenVPN


ANSWER: d

Computer Science & Information Technology

You might also like to view...

?Which of the following is the first step whilecreating a form based on two tables?

A. ?You should first choose the primary table and select the fields to include in the main form. B. ?You should first choose the primary table and select the fields to include in the subform. C. ?You should first choose the related table and select the fields to include in the main form. D. ?You should first choose the related table and select the fields to include in the subform.

Computer Science & Information Technology

Object-oriented programming uses a hierarchy of objects, also called classes, as the focus of the programming

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following statements best describes BSIMM?

A. Lists the top ten most critical application flaws. B. It is designed to help organizations understand, measure, and plan a software security initiative. C. It is an open framework that helps organizations formulate and implement a strategy for software security. D. It is designed to help organizations identify risks to software development.

Computer Science & Information Technology

What characteristics of a field control how the field displays and how data is entered?

a. field description b. table description c. field properties d. object properties

Computer Science & Information Technology