List some devices that can form the endpoints of the VPN.
What will be an ideal response?
A server running VPN protocols (e.g., IPSec)
A VPN appliance, which is a special hardware device devoted to setting up VPN communications
A firewall/VPN combination: Many high-end firewall programs support VPN setups as part of their built-in features.
A router-based VPN: Routers that support IPSec can be set up at the perimeter of the LANs to be connected. These are also sometimes called IPSec concentrators. IPSec concentrators use a complex set of security protocols to protect information, including Internet Key Exchange (IKE), which provides for the exchange of security keys between the machines in the VPN.
You might also like to view...
The Android design guidelines indicate that text displayed in your GUI should be brief, simple and friendly with the important words ________.
a. centered b. last c. in italics d. first
If a random access file contains a stream of characters, which of the following statements would move the file pointer to the starting byte of the fifth character in the file?
a. file.seek(4); b. file.seek(8); c. file.seek(10); d. file.seek(5);