Which of the following processes is used by remote users to make a secure connection to internal resources after establishing an Internet connection?
Tunneling
Spoofing
Packet filtering
Packet sniffing
Submit