What should be specified in a VPN security policy?

What will be an ideal response?


The policy should spell out who should have VPN access to your organizational network. For example, vendors might be granted access to the network through a VPN connection, but they may only be allowed to access information pertaining to their own company's accounts. The vendor VPN solution should have controls that allow the administrator to restrict where vendors can go on the organizational network. On the other hand, managers and full-time employees who access the network through a VPN while traveling should be granted more comprehensive access to network resources. The policy should also state whether authentication is to be used and how it is to be used, whether split tunneling (two connections over a VPN line) is permitted, how long users can be connected using the VPN at any one session, whether virus protection is included, and so on.

Computer Science & Information Technology

You might also like to view...

Which of the following is a true statement that Audrey can make to Kate about masks?

Kate had been previously having good luck controlling visibility in some simple animations by controlling the stacking order of layers. Later, she learned how to adjust the Alpha setting of an instance to control what was appearing on the stage at any given moment. However, as her animations have gotten more complex, she has turned to her friend Audrey for guidance on the use of masks to control visibility. a. The masked layer does not need to be locked to create a mask. b. When creating a mask, the color of the mask does not matter. c. The mask does not need to be locked to create a mask. d. When creating a mask, the alpha of the mask is important.

Computer Science & Information Technology

Using the format menu, the ____ option allows you to align two or more controls by their left, right, top, or bottom borders.

A. Location B. LineUp C. Align D. Match

Computer Science & Information Technology

Wikipedia is not considered a ________ source.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What kinds of arrays can variable-length argument lists work with?

a) one-dimensional arrays b) multi-dimensional arrays c) All of the above d) None of the above

Computer Science & Information Technology