____ are hardware devices or software modules that perform encryption to secure data, perform authentication to make sure the host requesting the data is an approved user of the VPN, and perform encapsulation to protect the integrity of the information being sent.

A. Endpoints
B. Access points
C. Concentrators
D. Tunnels

Answer: A

Computer Science & Information Technology

You might also like to view...

What are the benefits of aggregate functions? Give an example

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT a formula auditing tool?

A) Trace Precedents B) Trace Dependents C) Watch Window D) Calculation Options

Computer Science & Information Technology