220k views
5 votes
Will has been asked to recommend a protocol for his company to use for a VPN connection to the cloud service provider that his company uses. Which of the following protocols could he rule out as options for this connection?

a. IKEv2
b. TFTP
c. L2TP
d. GRE

1 Answer

3 votes

Answer:

The protocols that Will could rule out as options for this connection are:

b. TFTP

d. GRE

Step-by-step explanation:

A virtual private network (VPN) delivers encrypted connection over the Internet to prevent unauthorized data access, thereby facilitating remote work and the transmission of sensitive data.

IKEv2 (Internet Key Exchange version 2) and Layer Two Tunneling Protocol (L2TP) are secure encryption protocols that enable virtual private network (VPN).

Trivial File Transfer Protocol (TFTP) is not encrypted for receiving and sending files but a simple boot-loading File Transfer Protocol.

Generic routing encapsulation (GRE) tunnels do not encrypt data and are not secure unless used with other secure tunnelling protocols.

User Nikita Rybak
by
5.1k points