Which of the following protocols is a more secure version of the Point-to-Point Tunneling Protocol (PPTP) and provides tunneling, address assignment, and authentication?
Which of the following tools scans the network systems for well-known and often exploited vulnerabilities?
Which of the following tools examines a system for a number of known weaknesses and alerts the administrator?