A technician is creating a tunnel that hides IP addresses and secures all network traffic. Which of the following protocols is capable of enduring enhanced security?
A. DNS B. IPS C. VPN D. SSH
Correct Answer: C
Please disable your adblocker or whitelist this site!