A ____ uses a protocol such as IPsec or Secure Sockets Tunneling Protocol (SSTP) to create a tunnel through a carrier network.

A. STP
B. VLAN
C. VPN
D. NBC


Ans: C. VPN

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. A program can continue to run after an exception has been thrown and caught. 2. A function uses an exception specification that includes only int, but an exception of type double is thrown. A catch block is provided that catches a double, so things proceed properly.

Computer Science & Information Technology

After you create a gradient swatch from pink to yellow, you apply it to a frame. The gradient spans from left to right, and you want to make it span top to bottom. What can you do?

What will be an ideal response?

Computer Science & Information Technology

Which application stores the user's

desktop inside a virtual machine that resides on a server and is accessible from multiple locations? a. Application cell b. Container c. VDE d. VDI

Computer Science & Information Technology

How many different states do the switches in machine language have?

A. 1 B. 2 C. 8 D. 16

Computer Science & Information Technology