The company security policy led to the installation of a VPN concentrator and a RADIUS server. With only these devices installed, which of the following goals are not possible to achieve?

A. All data must be encrypted.
B. All connections must be authenticated.
C. Only certain external networks can be the source of a connection.
D. All connections must be authorized.


C
Explanation: A firewall would be required to ensure only certain external networks can be the source of a connection.

Computer Science & Information Technology

You might also like to view...

To associate a style sheet with screen devices that are greater than or equal to specific width, use the query ____.

A. media =  "screen and (max-width: value)" B. media = "screen and (min-width: value and max-width: value)" C. media =  "screen and (orientation: type)" D. media =  "screen and (min-width: value)"

Computer Science & Information Technology

A unique name for a form is specified by the Action attribute.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Where does a comment appear if a placeholder or text has not been selected?

A) In the Notes pane B) In the bottom right corner of the slide C) In the upper left corner of the slide D) In the center of the slide

Computer Science & Information Technology

An External Style Sheet uses the _____ file extension

a. ess b. css c. html d. No file extension is necessary

Computer Science & Information Technology