A network engineer is designing a secure tunneled VPN. Which of the following protocols would be the MOST secure?

A. IPsec
B. SFTP
C. BGP
D. PPTP


Answer: A. IPsec

Computer Science & Information Technology

You might also like to view...

The Gramm-Leach-Bliley Act ("GLBA") prohibits which of the following practices?

A. Sharing of personal information B. Transfer of financial accounts to financial institutions located outside the United States C. Pretexting D. Lending of money to individuals residing overseas

Computer Science & Information Technology

The first step in creating a table is to ____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The following is an example of a(n) __________ loop.

``` While x < 10 Set sum = sum + x Set x = x + 1 End While ``` a. count-controlled b. condition-controlled c. While d. Do-While

Computer Science & Information Technology

To enter vim extended mode, type the ____ symbol.

A. % B. $ C. # D. :

Computer Science & Information Technology