What types of protocols are used in VPNs?
(a) Application level protocols
(b) Tunnelling protocols
(c) Network protocols
(d) Mailing protocols
I got this question in an interview for internship.
I want to ask this question from VPNs topic in section Cyber Security of Cyber Security