The document discusses VPN tunneling protocols. It asks which choices list valid tunneling protocols - PPTP, L2TP, and IPSec. The solution confirms that PPTP, L2TP, and IPSec are indeed all valid VPN tunneling protocols as they can be used to create secure virtual tunnels between networks.
Which of the following are VPN (Virtual Private Network) tunneling pro.docx
1. Which of the following are VPN (Virtual Private Network) tunneling protocols?
A. IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and SSL (Secure
Sockets Layer)
B. IPSec (Internet Protocol Security), L2TP (Layer Two Tunneling Protocol), and PPP (Point-to-
Point
Protocol)
C. L2TP (Layer Two Tunneling Protocol), PPTP (Point-to-Point Tunneling Protocol), and SSL
(Secure Sockets
Layer)
D. PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer Two Tunneling Protocol), and IPSec
(Internet
Protocol Security)
Solution
D. PPTP (Point-to-Point Tunneling Protocol), L2TP (Layer Two Tunneling Protocol), and IPSec
(Internet
Protocol Security)
Tunneling refers creating a virtual dedicated connection between two systems or networks. You
create the
tunnel between the two ends by encapsulating the data in a mutually-agreed-upon protocol for
transmission. In most tunnels, the data passed through the tunnel appears at the other side as part
of the network. It's obvious
that L2TP and PPTP are tunneling protocols because the word tunneling is in the acronyms for
their name, but
IPSec is also considered a tunneling protocol because it creates a secure tunnel connection