Which of the following methods is used to provide access to a VPN?

A. IGP
B. PPTP
C. PPP
D. RAS


Answer: B. PPTP

Computer Science & Information Technology

You might also like to view...

MC Properties are accessed with the______ operator.

a) .. b) ->. c) :. d) ().

Computer Science & Information Technology

Both dual-IP-layer and dual-stack architecture require IPv6-over-IPv4 tunneling to be effective as a transition mechanism.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When viewing a report in ________, each section of the report has a bar above it with that section's name, and each group has its own header

A) Report view B) Print Preview C) Normal view D) Design view

Computer Science & Information Technology

Organization can resume operations within 10 business days in the event of a disaster. This type of site is BEST known as which of the following?

A. Hot site B. High-availability site C. Cold site D. Warm site

Computer Science & Information Technology