NAT limits the use of ………………….. and ………………
A. encryption, authentication.
B. encryption, decryption
C. encapsulation, translation
D. authentication, verification
A. encryption, authentication.
B. encryption, decryption
C. encapsulation, translation
D. authentication, verification