1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
3 years ago
11

Your boss wants you to configure his laptop so that he can access the company network when he is on the road. You suggest a VPN

connection to him. He is very concerned about security and asks you how secure VPN is. What do you tell him?
Computers and Technology
1 answer:
Rashid [163]3 years ago
5 0

Answer:

All traffic that flows between the laptop and VPN server is encrypted.

Explanation:

A Virtual Private Network (VPN) is a "tunnel" connection between computers that performs just like a regular point-to-point network connection (that is, IP address to IP address).  It has the added feature that encryption is enabled so that no intermediate server (or computer or line monitor, etc.) can decode the information that is in the data portion of the packets.

You might be interested in
All computers preform disk utilization the same software.<br> true or false
nikitadnepr [17]
"All computers preform disk utilization the same software "
This is false .
3 0
4 years ago
Read 2 more answers
What does it mean to have 2 warnings on brainly and what if i get another one?
steposvetlana [31]
By giving wrong answers or cheating I guess
5 0
3 years ago
Read 2 more answers
What are the three different categories of the types of rule ?
slamgirl [31]
Depends on what rules your talking about
3 0
3 years ago
A good hash algorithm is one that it cannot be reversed-engineerable or be easily attacked.
Free_Kalibri [48]

Answer:

A. True

Explanation:

7 0
3 years ago
Read 2 more answers
What are two types of processes used in technological systems
lesya [120]
Problem solving and design
Transformation which includes-Transportation,Communication and Manufacturing processes
8 0
4 years ago
Read 2 more answers
Other questions:
  • Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores = {10, 20, 3
    15·1 answer
  • You can initialize more than one variable in a for loop by placing a(n) ____ between the separate statements.
    10·2 answers
  • QUESTION 8 Software applications that generate information are located in the first tier of n-tier architectures. True False
    7·1 answer
  • True false you cannot fill in a callout​
    14·1 answer
  • To create a query string, you add a ____ immediately after a url, followed by the query string.
    15·1 answer
  • Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on th
    12·1 answer
  • In what country was the English royal family and nobility living before the Restoration?
    6·1 answer
  • Consider the following code example:
    12·1 answer
  • which statement is true? O A Future games will be more context oriented. OB. Future games will be more product driven. Future ga
    13·2 answers
  • Define a function calc_pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!