2. Answer: e. All of the above
3. Answer: b. False
4. Answer: b. Network roaming
5. Answer: c. Mapping user/groups, resources and access rules
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
- Webcast: Guarding the gate: VPN deployment strategies
- Technical article: Understanding IPsec identity and authentication options
- Podcast: The road ahead: Emerging VPN trends