Which of the following, if implemented, would improve security of remote users by reducing vulnerabilities associated with data-in-transit?

A. Full-disk encryption
B. A virtual private network
C. A thin-client approach
D. Remote wipe capability

Answer: B. A virtual private network

Computer Science & Information Technology

You might also like to view...

What are Sorting Layers used for?

What will be an ideal response?

Computer Science & Information Technology

Which of the following Linux commands can be used to view the current permissions, owner, and group of a file or directory?

a. chmod b. ls – l c. cp d. man

Computer Science & Information Technology