Which type of network is created when you use encrypted tunnels between a computer or a remote network and a private network through the Internet?

A. Peer-to-peer
B. Dial-up
C. Client/server
D. Virtual private network (VPN)


Answer: D

Computer Science & Information Technology

You might also like to view...

In the Set Up Show dialog box, which option is typically used when presenting to a live audience?

A) Browsed by an individual (window) B) Presented in online format (browser) C) Presented by a speaker (full screen) D) Browsed at a kiosk (full screen)

Computer Science & Information Technology

Before you create a graph, it is important to understand how data is plotted in the ____ window.

A. Category B. Graph Data C. Import data D. Group Data

Computer Science & Information Technology

Throughout its life, an Activity can be in one of several states—active (i.e., running), or stopped.

a. halted b. paused c. ceased d. discontinued

Computer Science & Information Technology

Moore's law refers to:

a. the amount of memory on a memory chip. b. the overall system processing capability. c. the number of transistors inside a CPU chip. d. the speed of DRAM.

Computer Science & Information Technology