A(n) _________ is a private, secure path across a public network that is set up to allow authorized users private, secure access to a network.
A. virtual private network (VPN)
B. local private network (LPN)
C. managed private network (MPN)
D. web private network (WPN)

Fill in the blank(s) with the appropriate word(s).


virtual private network

Rationale: A virtual private network (VPN) is a private, secure path across a public network (usually the Internet) that is set up to allow authorized users private, secure access to a network. VPNs allow an organization to provide secure, remote access to the company network without the cost of physically extending the private network. See 4-2: Network Characteristics

Computer Science & Information Technology

You might also like to view...

An ArrayList can only store ____ types.

A. primitive B. hidden C. wrapped D. reference

Computer Science & Information Technology

To convert an existing form to a split form, the form must be open in ________

A) Form view B) Design view C) Datasheet view D) Layout view

Computer Science & Information Technology

Which of the following is not an app that is available on Office Web Apps?

A) Excel B) OneNote C) Access D) Word

Computer Science & Information Technology

A ________ indicates a significant accomplishment within a project and includes a summary of the completed task along with the target date

a. Milestone b. Value c. Stake d. Scope

Computer Science & Information Technology