A site-to-site VPN connection uses a(n) __________.

Fill in the blank(s) with the appropriate word(s).

VPN concentrator

correct

Computer Science & Information Technology

You might also like to view...

In the case of ____, the response requires an outside party to assume the consequences of the risk.

A. risk mitigation B. risk transference C. risk acceptance D. risk avoidance

Computer Science & Information Technology

Which of the following is perhaps the most common blending mode?

A. Multiply B. Color C. Overlay D. Noise

Computer Science & Information Technology