Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
A.
Packet filtering
B.
Tunneling
C.
Packet sniffing
D.
Spoofing
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
A.
Packet filtering
B.
Tunneling
C.
Packet sniffing
D.
Spoofing