Try to answer these 80+ Virtual Private Network - VPN MCQs and check your understanding of the Virtual Private Network - VPN subject.
Scroll down and let's begin!
A. The private key used for authentication has been compromised
B. The identity certificate has been compromised
C. The certificate is no longer used
D. The certificate has expired
A. GRE
B. L2TP
C. PPTP
D. IPSec
E. MPLS
A. It can encrypt/decrypt IP traffic only
B. It can be used for authentication
C. It can be used for Layer 2 VPN protocol
D. It does not support multicast or broadcast
A. No additional software is required at the client's side
B. Secure application access is possible from anywhere
C. A large number of Web browsers are supported
D. Several methods of authentication are supported
A. Hybrid QoS
B. Integrated services
C. Best effort QoS
D. Differentiated services
A. Authentication
B. Encapsulation Method
C. Data Encryption
D. Packet Integrity
E. Key Management
A. 128
B. 192
C. 256
D. 512
E. 1024
A. Session Hijacking
B. Data Manipulation
C. No Header Information Protection
D. Weak Encryption
A. TCP/IP
B. AppleTalk
C. IPX
D. NetBEUI
A. Hub and Spoke Topology
B. Bus Topology
C. Full Mesh Topology
D. Ring Topology
A. Key Generation
B. Key Encryption
C. Key Distribution
D. Key Backup
A. Self-generated
B. Central SSL Certificate Authority
C. SSL Authority
D. Certificate Authority
A. Hybrid Mode
B. Virtual Mode
C. Tunnel Mode
D. Transport Mode
A. AppleTalk
B. IP
C. IPX
D. DECnet
A. Customer Edge Router
B. Provider Edge Router
C. Service Provider
D. Customer
E. Provider Router
A. Running virus scans on VPN servers and clients
B. Reviewing the logs
C. Disabling the account of the employee who leaves the organisation
D. Scanning the VPN server for vulnerablities
E. Using IDS
A. Inablity to connect VPN server
B. Inablity to connect hosts beyond VPN server
C. Inablity to browse the LAN after log in
D. Internet Connectivity
A. Network Access Server
B. L2TP access concentrator
C. L2TP Network Client
D. L2TP Network Server
A. Intrusions from the internet
B. Intrusions from an attached VPN
C. DoS attack
D. Internal threats
A. Cleartext passwords
B. Key Management
C. GRE Encapsulation
D. Encryption
A. It should offer strong encryption mechanism
B. It should support for Layer 2 & Layer 3 tunneling protocols
C. It should offer system level security
D. It should have strong network backbone
A. Device authentication
B. Using a firewall
C. Integrity checking
D. Encryption
A. Encapsulating Security Payload
B. Encapsulating Security Protocol
C. Authentication Heade
D. Authorization Header
A. It supports various topologies
B. It is scalable and flexible
C. It offers encryption
D. It is easy to implement and configure
A. Connectivity
B. Protection
C. Authentication
D. Application Compatibility
E. Management
A. They use symmetric keys
B. They use asymmetric keys
C. They make encryption faster
D. They make encryption slow
A. PPTP
B. L2TP
C. L2F
D. LT2P
A. Repudiation
B. Encryption
C. Integrity
D. Authentication
A. Hashing algorithm
B. Pre-shared keys
C. Digital Certificates
D. Digital Signatures
A. VPNC
B. IPSec-WIT
C. CERT
D. ICSA Labs
A. PPTP
B. PTPP
C. L2TP
D. L2F
E. LF2
A. DoS attack
B. Attack against VPN protocols
C. Cryptanalysis attacks
D. Security threats to VPN elements
A. Confidentiality
B. Availability
C. Integrity
D. Anti-replay
A. Primary Domain Controller
B. RADIUS server
C. TACACS server
D. LDAP
E. Novell Directory Service
A. It is connection-less
B. It is encrypting
C. It is non-encrypting
D. It is scalable
A. MPLS
B. PPTP
C. ATM
D. IPSec
A. Correct Device Positioning
B. Correct Bandwidth Planning
C. Service Overprovisioning
D. Anti-DoS solutions
A. 1701
B. 1702
C. 550
D. 4500
A. IKE
B. L2TP
C. PPTP
D. IPSec
A. IPSec header is inserted between IP and Lower layer header
B. IPSec header is inserted between IP and Upper layer header
C. There is no IPSec header
D. Only Authentication header is inserted
E. Only Encapsulating Security Payload is inserted
A. Spoofing
B. DoS attack
C. Brute Force attack
D. Key Management attack
A. Digital Certificate Authority
B. Certificate Authority
C. Central Certificate Authority
D. Central Certificate Team
A. MD5
B. Triple DES
C. DES
D. Rivest Cipher 4
A. Finger
B. TCP keepalives
C. NTP
D. Password encryption service
E. CDP
A. Diffie-Hellman
B. 3-DES
C. DES
D. MD5
A. 80
B. 443
C. 550
D. 4500
A. UDP 1702
B. UDP 1701
C. TCP 1702
D. TCP 1701
A. Through encryption
B. Through authentication
C. Through hashing
D. Through sequence numbers
A. DoS attack
B. Encryption
C. Repudiation
D. Network reconnaissance
A. Multi Protocol Layer Switching
B. Multi Protocol Label Switching
C. Multi Protocol Link Switching
D. Multi Protocol Label System
E. Multi Protocol Layer System