Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities associated with data-in-transit?
A. Full-disk encryption
B. A virtual private network
C. A thin-client approach
D. Remote wipe capability
Answer: B. A virtual private network
Computer Science & Information Technology
You might also like to view...
What are Sorting Layers used for?
What will be an ideal response?
Computer Science & Information Technology
Which of the following Linux commands can be used to view the current permissions, owner, and group of a file or directory?
a. chmod b. ls – l c. cp d. man
Computer Science & Information Technology