Which of the following network access security methods ensures communication occurs over a secured, encrypted channel, even if the data uses the Internet?
A. MAC filtering
B. RAS
C. SSL VPN
D. L2TP
Answer: C. SSL VPN
You might also like to view...
Which of the following are symbols and NOT displayed on a common keyboard?
A) copyright © B) paragraph ¶ C) trademark ™ D) tilde ~
The choices you see on the Paste button change depending on the object you have selected to paste
Indicate whether the statement is true or false
Which of the following describes a line chart??
A. ?It compares values from different categories. B. ?It displays all the levels of a hierarchy. C. ?It is used within a pie chart. D. ?Itcombines two or more data types to make the data easy to visualize.
The four memory management techniques presented in this chapter share the requirement that the entire program being executed must be ____.
A. loaded into memory B. stored on disk C. written in a single language D. relocatable