Which of the following methods is used to provide access to a VPN?
A. IGP
B. PPTP
C. PPP
D. RAS
Answer: B. PPTP
Computer Science & Information Technology
You might also like to view...
MC Properties are accessed with the______ operator.
a) .. b) ->. c) :. d) ().
Computer Science & Information Technology
Both dual-IP-layer and dual-stack architecture require IPv6-over-IPv4 tunneling to be effective as a transition mechanism.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When viewing a report in ________, each section of the report has a bar above it with that section's name, and each group has its own header
A) Report view B) Print Preview C) Normal view D) Design view
Computer Science & Information Technology
Organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?
A. Hot site B. High-availability site C. Cold site D. Warm site
Computer Science & Information Technology