This is an example of:

A user has logged into a company laptop while at a conference. The user is unable to log directly into the conference facility’s wireless network, but is able to connect to another user’s laptop and thereby access the conference materials. This is an example of:

A user has logged into a company laptop while at a conference. The user is unable to log directly into the conference facility’s wireless network, but is able to connect to another user’s laptop and thereby access the conference materials. This is an example of:

A.
VPN tunneling.

B.
peer to peer.

C.
client/server.

D.
shoulder surfing.



Leave a Reply 0

Your email address will not be published. Required fields are marked *