Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

A.
Spoofing

B.
Packet sniffing

C.
Tunneling

D.
Packet filtering



Leave a Reply 0

Your email address will not be published. Required fields are marked *