Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?
A. ADSL
B. VPN
C. NTP
D. VLAN
Answer: B
Computer Science & Information Technology
You might also like to view...
The BlockingQueue interface declares which two methods for blocked adding and blocked removing of elements from a circular buffer?
a. put and take. b. add and remove. c. push and pop. d. place and get.
Computer Science & Information Technology
A(n) ________ is an introductory frame that displays before a video begins playing
Fill in the blank(s) with correct word
Computer Science & Information Technology
An icon holds files
Indicate whether the statement is true or false
Computer Science & Information Technology
Assuming the following pseudocode for the Fibonacci series, what is the value of fibonacci(5)?
fibonacci(0) = 0 fibonacci(1) = 1 fibonacci(n) = fibonacci(n – 1) + fibonacci(n – 2) a) 8 b) 1 c) 3 (d) 5
Computer Science & Information Technology