Your employer has several thousand internal users all who need to access the internet on a daily basis to complete their work. What technology should be used to mask the internal IP addresses of these users and allow access to the internet through shared public IP addresses?
|Threats, Vulnerabilities, and Mitigations
|Security Program Management and Oversight
|General Security Concepts