The ___________ functions as an access control point for users in remote locations connecting to an enterprise's internal network.
a. VPN (Virtual Private Network)
b. Firewall
c. Proxy server
d. Intrusion detection system