_____________ is a common standard for use by layer 2 access VPNs for encapsulation.

a. L2TP
b. VPN2
c. Encapsule2
d. TCP/IP
e. PPP


Answer: a. L2TP

Computer Science & Information Technology

You might also like to view...

The first stage in the operational planning process is a(n) ____.

A. risk assessment B. status assessment C. asset assessment D. threat assessment

Computer Science & Information Technology

If the head instance variable of a linked list contains a reference to null, this means the list is:

a. full b. empty c. lost d. none of the above

Computer Science & Information Technology

Which IE tab enables you to delete all the saved information such as recently visited websites?

A) Connections B) Programs C) General D) Content

Computer Science & Information Technology

A cell is referred to by its cell ____.

A. reference B. index C. menu D. placeholder

Computer Science & Information Technology