What is tunneling?
- using digital certificates to ensure that data endpoints are authentic
- creating a hash to ensure the integrity of data as it traverses a network
- using alternate paths to avoid access control lists and bypass security measures
- encapsulating an entire packet within another packet for transmission over a network
Exam with this question: CCNA Exploration 4: EWAN Final Exam
Please login or Register to submit your answer