FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS A FIREWALL IN NETWORK SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
One of the first VPN protocols; developed by Microsoft; uses TCP port 1723
A
PPTP
B
L2F
C
L2TP
D
IPsec
Explanation: 

Detailed explanation-1: -The Point-to-Point Tunneling Protocol (PPTP) tunnels PPP via IP. A consortium of vendors, including Microsoft, 3COM, and others, developed it. PPTP uses Generic Routing Encapsulation (GRE) to pass PPP via IP, and uses TCP for a control channel (using TCP port 1723).

Detailed explanation-2: -Point-to-Point Tunneling Protocol (PPTP) uses TCP port 1723 and IP protocol 47 Generic Routing Encapsulation (GRE). PPTP provides a low-cost, private connection to a corporate network through the Internet. PPTP works well for people who work from home or travel and need to access their corporate networks.

Detailed explanation-3: -PPTP VPN is the process of creating and managing VPN connections or services using point-to-point tunneling protocol (PPTP). It is one of the most common ways of creating a VPN connection, and operates at layer 2 of the OSI model. PPTP VPN is also known as VPN over PPTP.

Detailed explanation-4: -PPTP uses a TCP control channel and a Generic Routing Encapsulation tunnel to encapsulate PPP packets. Many modern VPNs use various forms of UDP for this same functionality.

Detailed explanation-5: -Point-to-Point Tunneling Protocol (PPTP)-PPTP was developed by Microsoft as one of the first VPN protocols. PPTP: Uses standard authentication protocols such as CHAP and PAP. Supports TCP/IP only.

There is 1 question to complete.