Match each description with its corresponding VPN characteristic:
Uses passwords, digital certificates, smart cards, and biometrics
Prevents tampering and alterations to data while data travels between the source and destination
Protects the contents of messages from interception by unauthenticated or unauthorized sources
Uses hashes
Ensures that the communicating peers are who they say they are
Uses encapsulation and encryption
A. Data confidentiality
B. Data integrity
C. Authentication
Uses passwords, digital certificates, smart cards, and biometrics | Authentication |
Prevents tampering and alterations to data while data travels between the source and destination | Data integrity |
Protects the contents of messages from interception by unauthenticated or unauthorized sources | Data confidentiality |
Uses hashes | Data integrity |
Ensures that the communicating peers are who they say they are | Authentication |
Uses encapsulation and encryption | Data confidentiality |
Exam with this question: EWAN v4 Chapter 6 Check Your Understanding: Teleworker Services
Please login or Register to submit your answer