Which of the following types of technologies will create a tunneled encrypted connection from a remote location into a corporate network to be able to access resources as if the user was physically connected to the LAN?

A. ADSL
B. VPN
C. NTP
D. VLAN


Answer: B

Computer Science & Information Technology

You might also like to view...

The BlockingQueue interface declares which two methods for blocked adding and blocked removing of elements from a circular buffer?

a. put and take. b. add and remove. c. push and pop. d. place and get.

Computer Science & Information Technology

A(n) ________ is an introductory frame that displays before a video begins playing

Fill in the blank(s) with correct word

Computer Science & Information Technology

An icon holds files

Indicate whether the statement is true or false

Computer Science & Information Technology

Assuming the following pseudocode for the Fibonacci series, what is the value of fibonacci(5)?

fibonacci(0) = 0 fibonacci(1) = 1 fibonacci(n) = fibonacci(n – 1) + fibonacci(n – 2) a) 8 b) 1 c) 3 (d) 5

Computer Science & Information Technology