Virtual private networks (VPNs) employ which protection mechanism?(1 point)
Responses
hash algorithms
hash algorithms
multifactor authentication (MFA)
multifactor authentication (MFA)
checksums
checksums
encryption
Responses
hash algorithms
hash algorithms
multifactor authentication (MFA)
multifactor authentication (MFA)
checksums
checksums
encryption