How can a company ensure protection against eavesdropping and session hijacking for its workers connecting to a public cloud?

A. Access resources with a Web browser.
B. Use a VPN.
C. Implement multi-factor authentication.
D. Use standard PPTP.


Answer: B. Use a VPN.

Computer Science & Information Technology

You might also like to view...

If one customer can purchase many items, one-to-many is called the ________ of the relationship

A) joining B) redundancy C) integrity D) cardinality

Computer Science & Information Technology

The ________ is the main workspace and displays the current slide

A) Slide pane B) Storyboard C) Placeholder D) Notes pane

Computer Science & Information Technology

What scenarios could occur as a result of changing the runlevel of the system?

What will be an ideal response?

Computer Science & Information Technology

Suppose a, b and c are the lengths of the 3 sides of a triangle. Write an if-statement that will determine if the triangle is isosceles (at least 2 of the 3 sides are equal). You may assume that a, b and c are of type int.

What will be an ideal response?

Computer Science & Information Technology