A site-to-site VPN connection uses a(n) __________.
Fill in the blank(s) with the appropriate word(s).
VPN concentrator
correct
Computer Science & Information Technology
You might also like to view...
In the case of ____, the response requires an outside party to assume the consequences of the risk.
A. risk mitigation B. risk transference C. risk acceptance D. risk avoidance
Computer Science & Information Technology
Which of the following is perhaps the most common blending mode?
A. Multiply B. Color C. Overlay D. Noise
Computer Science & Information Technology