1 | 5/6 | 9 | |||||||||||||||||||
2 | |||||||||||||||||||||
7 | |||||||||||||||||||||
8 | |||||||||||||||||||||
3 | |||||||||||||||||||||
4 | |||||||||||||||||||||
1. A type of VPN that connects two or more networks together, typically used by businesses with multiple locations.
2. The process of encapsulating data within a different protocol to ensure its secure transmission over a public network.
3. The state of being unidentifiable or untraceable while using a virtual private network.
4. A server that handles the VPN connections and provides secure access to the private network.
5. A protocol suite used for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet in a data stream.
6. A protocol suite used to secure internet communication by authenticating and encrypting each IP packet of a communication session.
7. An open-source VPN protocol that uses SSL/TLS protocols for secure communication.
8. A type of VPN that allows individual users to remotely access a private network over the internet.
9. Software that enables users to establish a secure connection to a virtual private network.