Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
A.
MAC filtering
B.
RAS
C.
SSL VPN
D.
L2TP
Explanation:
SSL VPN consists of one or more VPN devices to which the user connects by using
his Web browser. The traffic between the Web browser and the SSL VPN device is encrypted with
the SSL protocol or its successor, the Transport Layer Security (TLS) protocol.