Which of the following protocols is NOT used for Windows 7 VPN connections?
A. SMTP
B. PPTP
C. L2TP
D. SSTP
Answer: A
You might also like to view...
In a query, you can select any records that have no value in a field using the ________ criteria
Fill in the blank(s) with correct word
Which of the following types of attacks can be used to find the Remote Procedure Call service on a system when using SATAN?
a. Light b. Normal c. Medium d. Heavy
A(n) __________ is an action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that correct action can be taken.
A. attack B. countermeasure C. adversary D. protocol
In the object-oriented database model, this term is the equivalent to a field in a relational model.
A. method B. entity C. class D. attribute