Which of the following protocols consists of two components, the transport and the encryption, and is widely used for VPNs?

a. SSH
b. SSL
c. EFS
d. PPTP


ANS: D

Computer Science & Information Technology

You might also like to view...

The disaster recovery test needs to have a set of ________ so everyone knows whether the plan and the team have passed

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Judaism and Islam it is customary not to portray images of people in their artworks.

a. true b. false

Computer Science & Information Technology

Explain how a mantrap works.

What will be an ideal response?

Computer Science & Information Technology

Formatting organizes the disk into ________ (rings) and sectors (wedges)

Fill in the blank(s) with correct word

Computer Science & Information Technology