This statement is true because encapsulating a protocol within another, a process known as tunneling, enables data to traverse networks that may not support the original protocol. This method can enhance security by hiding the original data format and can include encryption for additional protection.
Learn More
AI Generated Content may display inaccurate information, always double-check anything important.
What is tunneling in networking?
How does encryption enhance the security of tunneled data?
What are some common protocols that use tunneling?