A network architect is designing a remote access solution for mobile workers with laptop computers and will use GPRS technology for over-the-air communications. Because workers access sensitive information, what protection is required to protect GPRS traffic?
a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.
b. GPRS’s over-the-air encryption has been compromised and a VPN is needed.
c. GPRS has no over-the-air encryption and a VPN is needed.
d. GPRS is not suitable for Internet communications and should not be used.
a. GPRS’s over-the-air encryption is sufficient and no VPN is needed.
Computer Science & Information Technology
You might also like to view...
Which of the following file systems supports alternate data streams?
a. FAT32 b. HPFS c. Linux Ext4 d. NTFS 4.0
Computer Science & Information Technology
To determine whether scanning is illegal in your area, you should do which of the following?
a. Refer to U.S. code. b. Refer to the U.S. Patriot Act. c. Refer to state laws. d. Contact your ISP.
Computer Science & Information Technology