Virtual Private Network - VPN MCQs

Virtual Private Network - VPN MCQs

Try to answer these 80+ Virtual Private Network - VPN MCQs and check your understanding of the Virtual Private Network - VPN subject.
Scroll down and let's begin!

1: Due to which of the following reasons do you need to revoke a certificate?

A.   The private key used for authentication has been compromised

B.   The identity certificate has been compromised

C.   The certificate is no longer used

D.   The certificate has expired

2: Which of the following are the types of VPN?

A.   GRE

B.   L2TP

C.   PPTP

D.   IPSec

E.   MPLS

3: Which of the following statements are true of IPSec?

A.   It can encrypt/decrypt IP traffic only

B.   It can be used for authentication

C.   It can be used for Layer 2 VPN protocol

D.   It does not support multicast or broadcast

4: Which of the following are advantages of an SSL VPN?

A.   No additional software is required at the client's side

B.   Secure application access is possible from anywhere

C.   A large number of Web browsers are supported

D.   Several methods of authentication are supported

5: Which of the following are categories of QoS?

A.   Hybrid QoS

B.   Integrated services

C.   Best effort QoS

D.   Differentiated services

6: Which of the following are the components of the VPN?

A.   Authentication

B.   Encapsulation Method

C.   Data Encryption

D.   Packet Integrity

E.   Key Management

7: Which of the following key lengths are supported by AES?

A.   128

B.   192

C.   256

D.   512

E.   1024

8: Which of the following are the security concerns while using PPTP?

A.   Session Hijacking

B.   Data Manipulation

C.   No Header Information Protection

D.   Weak Encryption

9: Which of the following protocols are supported by PPTP?

A.   TCP/IP

B.   AppleTalk

C.   IPX

D.   NetBEUI

10: Which of the following topologies are possible in an IPSec VPN?

A.   Hub and Spoke Topology

B.   Bus Topology

C.   Full Mesh Topology

D.   Ring Topology

11: Which of the following are the most important issues in key management?

A.   Key Generation

B.   Key Encryption

C.   Key Distribution

D.   Key Backup

12: Which of the following ways can be used to generate SSL certificates?

A.   Self-generated

B.   Central SSL Certificate Authority

C.   SSL Authority

D.   Certificate Authority

13: Which of the following are IPSec modes?

A.   Hybrid Mode

B.   Virtual Mode

C.   Tunnel Mode

D.   Transport Mode

14: Which of the following protocols can be encapsulated with GRE?

A.   AppleTalk

B.   IP

C.   IPX

D.   DECnet

15: Which of the following are the components of a general MPLS VPN structure?

A.   Customer Edge Router

B.   Provider Edge Router

C.   Service Provider

D.   Customer

E.   Provider Router

16: Which of the following are the best practices for VPN security?

A.   Running virus scans on VPN servers and clients

B.   Reviewing the logs

C.   Disabling the account of the employee who leaves the organisation

D.   Scanning the VPN server for vulnerablities

E.   Using IDS

17: Which of the following are the most common VPN problems?

A.   Inablity to connect VPN server

B.   Inablity to connect hosts beyond VPN server

C.   Inablity to browse the LAN after log in

D.   Internet Connectivity

18: Which of the following are components of L2TP Transactions?

A.   Network Access Server

B.   L2TP access concentrator

C.   L2TP Network Client

D.   L2TP Network Server

19: Which of the following can be threats in an MPLS VPN?

A.   Intrusions from the internet

B.   Intrusions from an attached VPN

C.   DoS attack

D.   Internal threats

20: Which of the following are PPTP vulnerabilities?

A.   Cleartext passwords

B.   Key Management

C.   GRE Encapsulation

D.   Encryption

21: Which of the following are the best practices to choose a VPN service provider?

A.   It should offer strong encryption mechanism

B.   It should support for Layer 2 & Layer 3 tunneling protocols

C.   It should offer system level security

D.   It should have strong network backbone

22: Which of the following measures are taken by IPSec VPN to combat man-in-the-middle attack?

A.   Device authentication

B.   Using a firewall

C.   Integrity checking

D.   Encryption

23: Which of the following are the IPSec security protocols?

A.   Encapsulating Security Payload

B.   Encapsulating Security Protocol

C.   Authentication Heade

D.   Authorization Header

24: Which of the following are advantages of MPLS VPN?

A.   It supports various topologies

B.   It is scalable and flexible

C.   It offers encryption

D.   It is easy to implement and configure

25: Which of the following features should be evaluated in a VPN solution?

A.   Connectivity

B.   Protection

C.   Authentication

D.   Application Compatibility

E.   Management

26: Which of the following are advantages of DES and 3DES?

A.   They use symmetric keys

B.   They use asymmetric keys

C.   They make encryption faster

D.   They make encryption slow

27: Which of the following protocols can use authentication protocols such as RADIUS and TACACS+?

A.   PPTP

B.   L2TP

C.   L2F

D.   LT2P

28: Which of the following are functions of the keys?

A.   Repudiation

B.   Encryption

C.   Integrity

D.   Authentication

29: Which of the following are the authentication methods used in IPSec?

A.   Hashing algorithm

B.   Pre-shared keys

C.   Digital Certificates

D.   Digital Signatures

30: Which of the following sources can be used for testing interoperability between VPN vendors?

A.   VPNC

B.   IPSec-WIT

C.   CERT

D.   ICSA Labs

31: Which of the following protocols are supported by VPDN?

A.   PPTP

B.   PTPP

C.   L2TP

D.   L2F

E.   LF2

32: Which of the following are types of VPN attacks?

A.   DoS attack

B.   Attack against VPN protocols

C.   Cryptanalysis attacks

D.   Security threats to VPN elements

33: Which of the following are feartures of the IPSec Technology?

A.   Confidentiality

B.   Availability

C.   Integrity

D.   Anti-replay

34: Which of the following are widely used account databases?

A.   Primary Domain Controller

B.   RADIUS server

C.   TACACS server

D.   LDAP

E.   Novell Directory Service

35: Which of the following are the features of an MPLS VPN?

A.   It is connection-less

B.   It is encrypting

C.   It is non-encrypting

D.   It is scalable

36: Which of the following are the Layer 3 VPNs?

A.   MPLS

B.   PPTP

C.   ATM

D.   IPSec

37: Which of the following measures should be taken to make a DoS resistant network

A.   Correct Device Positioning

B.   Correct Bandwidth Planning

C.   Service Overprovisioning

D.   Anti-DoS solutions

38: Which port is used by L2TP?

A.   1701

B.   1702

C.   550

D.   4500

39: Which of the following protocols is used for key management?

A.   IKE

B.   L2TP

C.   PPTP

D.   IPSec

40: Which of the following statements is true of the Transport mode in IPSec?

A.   IPSec header is inserted between IP and Lower layer header

B.   IPSec header is inserted between IP and Upper layer header

C.   There is no IPSec header

D.   Only Authentication header is inserted

E.   Only Encapsulating Security Payload is inserted

41: To which of the following attacks is IPSec vulnerable to?

A.   Spoofing

B.   DoS attack

C.   Brute Force attack

D.   Key Management attack

42: Which of the following authorities issues Digital Certificates?

A.   Digital Certificate Authority

B.   Certificate Authority

C.   Central Certificate Authority

D.   Central Certificate Team

43: Which of the following symmetric algorithms has variable key length?

A.   MD5

B.   Triple DES

C.   DES

D.   Rivest Cipher 4

44: Which of the following services should be disabled on an MPLS VPN router?

A.   Finger

B.   TCP keepalives

C.   NTP

D.   Password encryption service

E.   CDP

45: Which of the following is a Hashing algorithm?

A.   Diffie-Hellman

B.   3-DES

C.   DES

D.   MD5

46: Which of the following ports is used by SSL?

A.   80

B.   443

C.   550

D.   4500

47: Which of the following port is used by L2F?

A.   UDP 1702

B.   UDP 1701

C.   TCP 1702

D.   TCP 1701

48: How does IPSec handle the confidentiality of a message?

A.   Through encryption

B.   Through authentication

C.   Through hashing

D.   Through sequence numbers

49: The act of learning information about the target network is called?

A.   DoS attack

B.   Encryption

C.   Repudiation

D.   Network reconnaissance

50: What is MPLS network?

A.   Multi Protocol Layer Switching

B.   Multi Protocol Label Switching

C.   Multi Protocol Link Switching

D.   Multi Protocol Label System

E.   Multi Protocol Layer System