What is a commonly used protocol for managing secure data transmission over a Virtual Private Network (VPN)? Available Choices (select all choices that are correct)
Which of the following tools has the potential for serious disruption of a control network and should not be used on a live system? Available Choices (select all choices that are correct)