Which of the following technologies allows secure communication with a previously unverified
entity?
A.
VPN
B.
IMAP
C.
TKIP
D.
PKI
Explanation:
Which of the following technologies allows secure communication with a previously unverified
entity?
Which of the following technologies allows secure communication with a previously unverified
entity?
A.
VPN
B.
IMAP
C.
TKIP
D.
PKI
Explanation: