A common attack against converged network communications is eavesdropping. How can this attack be prevented?

A. Use a VPN.
B. Deploy multi-factor authentication.
C. Use strict sequencing rules.
D. Implement DHCP.

Answer: A. Use a VPN.

Computer Science & Information Technology

You might also like to view...

________ is a collection of formatting options that can be applied to a picture, to text, or even to an object

A) A theme B) A style C) A transition D) Animation

Computer Science & Information Technology

Two families of elliptic curves are used in cryptographic applications: prime curves over Zp and __________ over GF(2m).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology