In a virtual private network (VPN), a process called _________ is used to carry the data over the Internet; special encryption technology is used to protect the data so it cannot be understood if it is intercepted during transit.
A. tunneling
B. bridging
C. coupling
D. linking

Fill in the blank(s) with the appropriate word(s).


tunneling

Rationale: In a virtual private network (VPN), a process called tunneling is typically used to carry the data over the Internet; special encryption technology is used to protect the data so it cannot be understood if it is intercepted during transit. Personal VPNs can be used by individuals to provide a secure path to a public hotspot. See 4-2: Network Characteristics

Computer Science & Information Technology

You might also like to view...

A flagged word is one that is misspelled.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ objects means to position one or more objects in relation to each other in relation to the margins of a document, or in relation to the boundaries of the page or spread.

A. Spacing B. Distributing C. Aligning D. Grouping

Computer Science & Information Technology

A variable with ____ scope has storage created for it by a declaration statement located outside any function.

a. local b. global c. internal d. function

Computer Science & Information Technology

When an HVAC technician considers the air conditioning requirements for a computer facility, the technician calculates the ____.

A. voltage B. amperage C. wattage D. ambient temperature

Computer Science & Information Technology