A company's security policy requires that all remote communications with the corporate network must be encrypted and authenticated. Which technology would best fit these requirements?

  • VPN (Virtual Private Network)
  • SSL/TLS (Secure Sockets Layer/Transport Layer Security)
  • IPsec (Internet Protocol Security)
  • SSH (Secure Shell)
IPsec is commonly used for encrypting and authenticating remote communications, making it suitable for the described security policy.
Add your answer
Loading...

Leave a comment

Your email address will not be published. Required fields are marked *