VPNs protect packets by performing IP encapsulation, the process of enclosing one packet within another one that has different ____.

A. a port number
B. IP source and destination information
C. a user name
D. a protocol


Answer: B

Computer Science & Information Technology

You might also like to view...

Due to the fact that audits are costly to perform, they are conducted on an ad hoc basis.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The PrintDocument object can raise a ________ event.

a) Print b) HasMorePages c) NextPage d) PrintPage e) All of the above.

Computer Science & Information Technology

You can modify the design of any form by right-clicking the tab at the top of the form and selecting ____ View.

A. Form B. Design C. Layout D. Datasheet

Computer Science & Information Technology

Match the following Multimedia Copyright Guidelines with their descriptions:

I. percentage of a copyright work that can be used II. number of images from a collection that can be used III. seconds of music or sound that can be used IV. number of copies that can be distributed V. number of works by an artist or photographer that can be used A. 2 B. 5 C. 10 D. 15 E. 30

Computer Science & Information Technology