Which of the following protocols is NOT used for Windows 7 VPN connections?

A. SMTP
B. PPTP
C. L2TP
D. SSTP


Answer: A

Computer Science & Information Technology

You might also like to view...

In a query, you can select any records that have no value in a field using the ________ criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following types of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?

a. Light b. Normal c. Medium d. Heavy

Computer Science & Information Technology

A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.

A. attack B. countermeasure C. adversary D. protocol

Computer Science & Information Technology

In the object-oriented database model, this term is the equivalent to a field in a relational model.

A. method B. entity C. class D. attribute

Computer Science & Information Technology