____ are hardware devices or software modules that perform encryption to secure data, perform authentication to make sure the host requesting the data is an approved user of the VPN, and perform encapsulation to protect the integrity of the information being sent.
A. Endpoints
B. Access points
C. Concentrators
D. Tunnels
Answer: A
Computer Science & Information Technology
You might also like to view...
What are the benefits of aggregate functions? Give an example
What will be an ideal response?
Computer Science & Information Technology
Which of the following is NOT a formula auditing tool?
A) Trace Precedents B) Trace Dependents C) Watch Window D) Calculation Options
Computer Science & Information Technology