Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

A.
Packet filtering

B.
Tunneling

C.
Packet sniffing

D.
Spoofing



Leave a Reply 0

Your email address will not be published. Required fields are marked *