IPsec is used for ________ VPNs

A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B


C

Business

You might also like to view...

In the business-to-business buying process, the first step is:

A) identification of a need B) establishment of specifications C) identification of alternatives D) appointing a committee

Business

In the target costing approach to the product development process, the selling price is determined at the end of the process

Indicate whether the statement is true or false

Business

Define the concept of security in the digital age. Name at least three specific measures that one could take to prevent security breaches on the Internet.   

What will be an ideal response?

Business

The parameters in the procedure declaration of an application are called actual parameters.

Answer the following statement true (T) or false (F)

Business