Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
A.
Spoofing
B.
Packet sniffing
C.
Tunneling
D.
Packet filtering
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?
A.
Spoofing
B.
Packet sniffing
C.
Tunneling
D.
Packet filtering