What name is given to a protocol to implement a VPN connection between two
computers?
•
•
Question 116
The best fits for (ISC)2’s _____________ are personnel responsible for developing and
implementing processes used to assess risk and for establishing security requirements.
•
Question 117
CompTIA’s Security+ certification provides ________.
•
Question 118