COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Your company has two users who want to telecommute from home. They do not have any hardware or software configured or installed. They need to transfer files to the corporate network over a secure link. Your company has a Virtual Private Network (VPN) concentrator that uses Layer 2 Tunneling Protocol (L2TP) and Internet Protocol Security (IPSec). The users want to implement the fastest available service. Both of the users’ homes are within 10, 000 feet of a central office. Which of the following solutions address this scenario? (Choose all that apply.)
A
Each user should install a modem and VPN client software, and configure it to dial through a local Internet Service Provider (ISP) to connect to the company server using L2TP and IPSec.
B
Each user should establish a Digital Subscriber Line (DSL) connection by either ordering a new line or using the existing line. Each user then needs to install VPN client software and configure it to connect to the company server using L2TP and IPsec.
C
Each user should establish a cable television (CATV) connection with a local broadband ISP. Each user then needs to install VPN client software and configure it to connect to the company server using L2TP and IPSec.
D
Each user should install an Integrated Services Digital Network (ISDN) line in his or her house. Each user then needs to install VPN client software and configure it to dial through a local ISP to connect to the company server using L2TP and IPsec.
Explanation: 

Detailed explanation-1: -An SSL VPN provides a secure connection for remote users of applications and services via a web browser, without a need for additional desktop software.

Detailed explanation-2: -question. Network Operating System allows users to access the server remotely. Remote access to servers is possible from different locations in Network Operating System.

Detailed explanation-3: -VPN – Virtual Private Network – You can restrict access so that employees must exclusively connect through a VPN, providing a direct, encrypted connection between their remote device and the main office server.

Detailed explanation-4: -Virtual private network (VPN): VPNs are the most common form of remote access. IPsec VPN: SSL VPN: Desktop sharing: Secure Shell (SSH) remote access: Network access control (NAC): Single sign-on (SSO): Zero Trust network access (ZTNA): More items

There is 1 question to complete.