Which of the following should the network administrator deploy to comply with the new collection requirements?
Which of the following features can BEST be used to facilitate authorized remote access to a network?