Multiple Choice
The process of encapsulating one protocol to make it appear as another is referred to as:
A) IP spoofing
B) Bugging
C) Wiretapping
D) Tunneling
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q46: Match each statement below with the correct
Q47: The combination of the public key and
Q48: A(n) packet-filtering firewall is a software application
Q49: Match each statement below with the correct
Q50: The interception of a telephone conversation by
Q52: Which of the following is a security
Q53: Which of the following represents the combination
Q54: In _, data is encrypted using a
Q55: Which of the following is a person
Q56: Which of the following provides tunneling for