Which of the following security policies defines the use of VPN for gaining access to an internal corporate network?
A. Network security policy
B. Information protection policy
C. Access control policy
D. Remote access policy
A. Network security policy
B. Information protection policy
C. Access control policy
D. Remote access policy