IPsec is used for ________ VPNs
A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
C
You might also like to view...
In the business-to-business buying process, the first step is:
A) identification of a need B) establishment of specifications C) identification of alternatives D) appointing a committee
In the target costing approach to the product development process, the selling price is determined at the end of the process
Indicate whether the statement is true or false
Define the concept of security in the digital age. Name at least three specific measures that one could take to prevent security breaches on the Internet.
What will be an ideal response?
The parameters in the procedure declaration of an application are called actual parameters.
Answer the following statement true (T) or false (F)