Which of the following security policies defines the use of VPN for gaining access to an internal corporate network?
A. Network security policy
B. Remote access policy
C. Information protection policy
D. Access control policy
A. Network security policy
B. Remote access policy
C. Information protection policy
D. Access control policy