A technician wants to remotely log into an office computer using remote desktop. The technician needs to do this in a secure manner. Which of the following would accomplish this?

A. VPN
B. Telnet
C. VLAN
D. Tagged packets


Answer: A. VPN

Computer Science & Information Technology

You might also like to view...

Formula AutoComplete displays the names of functions that begin with the letter or letters you have typed in after the equal sign (=)

Indicate whether the statement is true or false

Computer Science & Information Technology

A chart element can be easily removed by selecting the element and pressing ________

A) Del B) Esc C) Ctrl + Del D) Alt + Del

Computer Science & Information Technology

When requirements begin to creep in from all angles without any further analysis, this is called scope creep.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The information security __________ is usually brought in when the organization makes the decision to outsource one or more aspects of its security program.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology