In a network configuration that leverages tunneling to secure communications, what does a full tunnel achieve?
It directs all network traffic through a secured path.
Traffic remains unencrypted to optimize speed.
It allows all internet traffic to bypass the secured path.
It routes only internal network traffic through a secured path.