Which one of the tunneling protocols requires IPSec to secure data?

a. L2TP
b. PPTP
c. SSTP
d. IKEv2


C.

Computer Science & Information Technology

You might also like to view...

List and describe the three types of virtual networks you can create in Hyper-V.

What will be an ideal response?

Computer Science & Information Technology

When using wildcard characters in a query, ch* in the criteria of a FoodName field would return churros, chimichanga, or anchovies

Indicate whether the statement is true or false

Computer Science & Information Technology

The statement, 'or '1'='1, always returns ____.

A. true B. false C. yes D. no

Computer Science & Information Technology

In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely resembled human languages.

A. second B. third C. fourth D. none of the above

Computer Science & Information Technology