A ________ uses the Internet communications infrastructure to build a secure and private network

A) HAN B) WAN C) VPN D) PAN

C

Computer Science & Information Technology

You might also like to view...

To get help with a Windows command-line program, use this syntax: programname /h

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?

A. Syslog files B. Honeypot C. Network sniffer D. tracert

Computer Science & Information Technology