a. Protocols used for tunnelling the traffic |
b. Whether VPNs are providing site-to-site or remote access connection |
c. Securing the network from bots and malwares |
d. Levels of security provided for sending and receiving data privately |
Answer: Securing the network from bots and malwares |