A ________ uses the Internet communications infrastructure to build a secure and private network
A) HAN B) WAN C) VPN D) PAN
C
Computer Science & Information Technology
You might also like to view...
To get help with a Windows command-line program, use this syntax: programname /h
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following would be used to check whether a DoS attack is taking place from a specific remote subnet?
A. Syslog files B. Honeypot C. Network sniffer D. tracert
Computer Science & Information Technology