You need connect to resources from an offsite location while ensuring the traffic is protected. Which of the following should you use to gain access to the secure network?

A. SSH
B. VPN
C. SFTP
D. RDP


Answer: B. VPN

Computer Science & Information Technology

You might also like to view...

In Excel, ________ is one method of what-if analysis

A) goal seek B) flash fill C) data validation D) error checking

Computer Science & Information Technology

Fill in the missing values in this chart of positional values for the rightmost four positions in each of the indicated number systems:

decimal 1000 100 10 1 hexadecimal ... 256 ... ... binary ... ... ... ... octal 512 ... 8 ...

Computer Science & Information Technology

A(n) ________ document is a text document that can be viewed in a Web browser

Fill in the blank(s) with correct word

Computer Science & Information Technology

The area bounded by the axes, including all the data series is called ________

A) format B) chart area C) plot area D) data points

Computer Science & Information Technology