Closed user groups

a. require call-back devices to operate
b. allow a secure network within a public packet data network
c. offer special error checking functions for certain users
d. are not more secure than a dial-up phone connection

b. allow a secure network within a public packet data network

Computer Science & Information Technology

You might also like to view...

The mouse pointer may appear as a(n) ________ during the time you are waiting for a computer to boot

A) hour glass B) four-headed arrow C) rotating circle D) double-arrow

Computer Science & Information Technology

A standard that outlines characteristics of how two devices communicate on a network is called a(n) ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology