What technology enables authorized users to use an unsecured public network, such as the Internet as if it were a secure private network?

A. IKE tunnel
B. VPN
C. endpoint
D. router


Answer: B

Computer Science & Information Technology

You might also like to view...

The ____ statement can be used to code a multiple-alternative selection structure.

A. Select B. Select Option C. Case D. Select Case

Computer Science & Information Technology

Twitter does allow the sending of private tweets, called personal messages, to anyone who follows your tweets

Indicate whether the statement is true or false

Computer Science & Information Technology

________ dependency occurs when the value of one field is determined by the value of another field

Fill in the blank(s) with correct word

Computer Science & Information Technology

Formatting text with a heading style provides a visual cue as to the relative importance of the text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology