A technician wants to remotely log into an office computer using remote desktop. The technician needs to do this in a secure manner. Which of the following would accomplish this?
A. VPN
B. Telnet
C. VLAN
D. Tagged packets
Answer: A. VPN
Computer Science & Information Technology
You might also like to view...
Formula AutoComplete displays the names of functions that begin with the letter or letters you have typed in after the equal sign (=)
Indicate whether the statement is true or false
Computer Science & Information Technology
A chart element can be easily removed by selecting the element and pressing ________
A) Del B) Esc C) Ctrl + Del D) Alt + Del
Computer Science & Information Technology
When requirements begin to creep in from all angles without any further analysis, this is called scope creep.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The information security __________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology