A remote worker wants to connect his computer to his corporation’s private trusted network over the Internet.
 
Which of the following will need to be configured?

A. VPN tunnel
B. Address reservation
C. DHCP server
D. Firewall


Answer: A

Computer Science & Information Technology

You might also like to view...

How does a search operation work in the linked list?

a. It requires traversing the entire list from the head to the tail of the list. b. The linked list is searched starting from the head. c. The linked list is searched starting from the tail. d. The linked list stores the most recent element to search for at the front or head of the list.

Computer Science & Information Technology

Not every computer program is an algorithm.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Concentric circles on the surface of the hard drive are commonly called platters

Indicate whether the statement is true or false

Computer Science & Information Technology

This uses a 53 byte cell size to send data.

a. X.25 b. frame relay c. ATM d. MPLS

Computer Science & Information Technology