FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the following is not a Layer 2 tunneling protocol?
A
PPTP
B
IPSEC
C
L2TP
D
L2F
Explanation: 

Detailed explanation-1: -Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by internet service providers (ISPs) to enable virtual private networks (VPNs). To ensure security and privacy, L2TP must rely on an encryption protocol to pass within the tunnel.

Detailed explanation-2: -Due to its lack of encryption and authentication, Layer 2 Protocol is usually paired with IPsec (Internet Protocol Security) protocol, which provides the encryption and controls packets within the tunnel. IPsec encrypts L2TP packets between the endpoints.

Detailed explanation-3: -Layer 2 Tunneling Protocol (L2TP) connections, which are also called virtual lines, provide cost-effective access for remote users by allowing a corporate network systems to manage the IP addresses assigned to its remote users.

Detailed explanation-4: -L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity.

There is 1 question to complete.