____ is a tunneling protocol that was developed by Microsoft and was extremely popular at one time for remote users who had to dial in to the corporate network on a secure channel.

A. GRE
B. L2TP
C. PPTP
D. IPSec


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about undoing in Access?

A) Until the design of an object is saved, you can click Undo to undo design changes. B) Just like in other Office applications, there is a great deal of undo/redo functionality in Access. C) Pressing Esc gets you out of an error. D) If you have made changes to several fields in a single record, you can click Undo to undo each of them.

Computer Science & Information Technology

A(n) ________ is a set of instructions that execute a sequence of commands to automate repetitive tasks

Fill in the blank(s) with correct word

Computer Science & Information Technology

At which layer of the OSI model does the encapsulation process begin?

A. Application B. Transport C. Session D. Network

Computer Science & Information Technology

After looking at the masthead to identify a website, most users will look for a text heading or browser bar to identify page content. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology