Network Chapter 6/7 true/false
After L2TP establishing a VPN tunnel, GRE is used to transmit L2TP data frames through the tunnel
False
NFC tags are very expensive and cannot be purchased blank, requiring them to be pre-loaded.
False
The MD5 hashing algorithm is not susceptible to the possibility of hash collisions.
False
All wireless signals are carried through the air by electromagnetic waves
True
An enterprise-wide VPN can include elements of both the client-to-site and site-to-site models.
True
Multipath signaling is a significant cause of fading
True
PPP can support several types of Network layer protocols that might use the connection
True
The WPS PIN is vulnerable to brute force attacks
True
Windows, UNIX, Linux, and Mac OS clients are all capable of connecting to a VPN using PPTP
True