Correct Answer: Encapsulation
Explanation:
Note: This Question is unanswered, help us to find answer for this one
Virtual Private Network - VPN Skill Assessment
Your Skill Level: Poor
Retake Quizzes to improve it
More Virtual Private Network - VPN MCQ Questions
Which port is used for NAT-Traversal?
Which protocol supports IKE?
To which attack is Diffie-Hellman algorithm vulnerable?
How does anti-replay mechanism work in IPSec Technology?
Which protocol is used by PPTP to tunnel packets?
Advantages of MPLS VPN?
Which are the IPSec security protocols?
Which measures are taken by IPSec VPN to combat man-in-the-middle attack?
Best practices to choose a VPN service provider?
Which are PPTP vulnerabilities?