A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?
A. IPsec
B. SFTP
C. BGP
D. PPTP
Answer: A. IPsec
Computer Science & Information Technology
You might also like to view...
The Gramm-Leach-Bliley Act ("GLBA") prohibits which of the following practices?
A. Sharing of personal information B. Transfer of financial accounts to financial institutions located outside the United States C. Pretexting D. Lending of money to individuals residing overseas
Computer Science & Information Technology
The first step in creating a table is to ____.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The following is an example of a(n) __________ loop.
``` While x < 10 Set sum = sum + x Set x = x + 1 End While ``` a. count-controlled b. condition-controlled c. While d. Do-While
Computer Science & Information Technology
To enter vim extended mode, type the ____ symbol.
A. % B. $ C. # D. :
Computer Science & Information Technology