Which of the following protocols consists of two components, the transport and the encryption, and is widely used for VPNs?
a. SSH
b. SSL
c. EFS
d. PPTP
ANS: D
Computer Science & Information Technology
You might also like to view...
The disaster recovery test needs to have a set of ________ so everyone knows whether the plan and the team have passed
Fill in the blank(s) with correct word
Computer Science & Information Technology
In Judaism and Islam it is customary not to portray images of people in their artworks.
a. true b. false
Computer Science & Information Technology
Explain how a mantrap works.
What will be an ideal response?
Computer Science & Information Technology
Formatting organizes the disk into ________ (rings) and sectors (wedges)
Fill in the blank(s) with correct word
Computer Science & Information Technology