A list of protocols used is known as –
(a) protocol access
(b) protocol stack
(c) permutation stack
(d) none of the mentioned
I had been asked this question in an internship interview.
My query is from Topologies in portion Cryptography Overview, TCP/IP and Communication Networks of Cryptograph & Network Security