ISC Exam Questions

Which of the following processes is used by remote users to make a secure connection to internal res

Which of the following processes is used by remote users to make a secure connection to internal
resources after establishing an Internet connection?

A.
Spoofing

B.
Packet sniffing

C.
Tunneling

D.
Packet filtering