Which of the following is used to create a secured connection over an unsecured network?
A.
TCP/IP protocol
B.
Virtual Private Network (VPN)
C.
Single Sign-on (SSO)
D.
Kerberos
Which of the following is used to create a secured connection over an unsecured network?
Which of the following is used to create a secured connection over an unsecured network?
A.
TCP/IP protocol
B.
Virtual Private Network (VPN)
C.
Single Sign-on (SSO)
D.
Kerberos
Sites of interest we’ve a link to.