Which protocol should you implement to protect data that is transmitted over a VPN?

A. SET
B. IPsec
C. SHTTP
D. SFTP


B

Explanation: You should implement Internet Protocol Security (IPsec) to protect data that is transmitted over a VPN.

Computer Science & Information Technology

You might also like to view...

The most commonly used number formats are available as buttons in the _____ group on the HOME tab.

A. Value B. Cells C. Number D. Data

Computer Science & Information Technology

When you close a table after using a selection filter and then reopen it, what happens to the filter?

A) The filter is not saved. B) The filter is still operating. C) The filter is removed, but Toggle Filter will bring it back. D) The filter is removed permanently.

Computer Science & Information Technology

A(n) ____________________ is a collection of data stored on a computer using an application called a database management system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Class E IP address range is used for what purpose?

What will be an ideal response?

Computer Science & Information Technology