1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
3 years ago
12

Which process is used to protect transmitted data in a vpn?

Computers and Technology
1 answer:
wlad13 [49]3 years ago
3 0
Here is the answer: <span>Tunneling</span>
You might be interested in
Consider the following scenario below and recommend a solution.
sammy [17]

your account has enabled profile pictures for your users, you can manage all profile pictures for your account. Profile pictures are public and automatically approved when users upload an image in their settings. Using profile pictures can make it easier to see the users in your account and managing them gives you the ability to keep the pictures appropriate.

If Gravatars are enabled for an institution in account settings, and a user has a Gravatar but chooses not to upload a profile picture, the Gravatar will display for the user's profile picture.

If a student views another student's user details in a course and reports a profile picture as inappropriate, you can review those profile pictures and approve, lock, or delete the picture. In the courses, instructors can remove profile pictures completely from a user's details page.

5 0
3 years ago
_____ can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard
Monica [59]
<span>Keyloggers can be either software-based or deployed via hardware, such as a recording "dongle" that is plugged in between a keyboard and a PC.
</span><span>The keylogger is also called keystroke logger or system monitor. This technology used to monitor and record each keystroke typed on a specific computer's keyboard. </span>
6 0
3 years ago
User name ideas for ro blox? I'm changing mine and I dont know what I want. No numbers or underscores!
SpyIntel [72]
Lil.younging or 2k(your name)
8 0
3 years ago
Read 2 more answers
When resizing images or objects in a presentation, why should a user not utilize the sizing handles in the middle of the sides o
Volgvan

Answer:

b. It will resize the image but not maintain aspect ratio

Explanation: is correct. post protected

7 0
2 years ago
What is the least effective way to create balance and flow in your life?
ratelena [41]
<span>Act on your emotions in the moment instead of thinking about them. </span>
6 0
3 years ago
Other questions:
  • Describe Mr. Digby, the principal. ​
    10·1 answer
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • T F The scope of a parameter is limited to the function which uses it.
    12·1 answer
  • What is data protection
    13·1 answer
  • Who was the first person to make a portable computer?
    5·1 answer
  • Which best explains why magnets can push on or pull other magnets without touching them?
    9·1 answer
  • In a system using the relocatable dynamic partitions scheme, given the following situation (and using decimal form): Job Q is lo
    5·1 answer
  • What are the differences in LAN and WAN and how they are used to Increase Cybersecurity
    7·1 answer
  • To implement a small database, a database designer must know the "1" and the "M" sides of each relationship and whether the rela
    13·1 answer
  • Question 1 of 10 Which type of information systems personnel are involved in organizing information so that users can access it
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!