____ is a suite of protocols, accepted as an industry standard, which provides secure data transmission over layer 3 of the OSI model.

A. L2TP
B. PPTP
C. GRE
D. IPSec


Answer: D

Computer Science & Information Technology

You might also like to view...

In JXTA, __________ act as virtual communication channels.

a) pipes b) advertisements c) endpoint routers d) peers

Computer Science & Information Technology

How a graph is represented in computer memory depends on the specific application.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The majority of business transactions, billions of them per day, are still done on ____________________ code that has now been updated and is likely to continue to run for the foreseeable future.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. A form of communication that promotes a product or service to a potential customer B. The placement of this determines from where the viewer seems to be looking C. Allows you to select a consistently colored area with a single click D. Dragging this changes the value in the accompanying text box on the options bar E. A sketch design intended to help you make choices about placement, size, and perspective F. In an advertisement, this can be suggestive of how a product might look on a table, for example G. A means of fooling the eye by making it appear as if there is depth or receding space in the image H. Sometimes used in wedding photos or when a haloed effect is desired I. Border with sizing handles around a selection J. Available for the Elliptical Marquee Tool, the Lasso Tool, the Polygonal Lasso Tool, the Magnetic Lasso Tool, and the Magic Wand Tool

Computer Science & Information Technology