Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
A.
MAC filtering
B.
RAS
C.
SSL VPN
D.
L2TP
Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
Which of the following network access security methods ensures communication occurs over a
secured, encrypted channel, even if the data uses the Internet?
A.
MAC filtering
B.
RAS
C.
SSL VPN
D.
L2TP