Virtual Private Network - VPN MCQs

Virtual Private Network - VPN MCQs

Try to answer these 80+ Virtual Private Network - VPN MCQs and check your understanding of the Virtual Private Network - VPN subject.
Scroll down and let's begin!

1: Due to which of the following reasons do you need to revoke a certificate?

A.   The private key used for authentication has been compromised

B.   The identity certificate has been compromised

C.   The certificate is no longer used

D.   The certificate has expired

2: Which of the following are the types of VPN?

A.   GRE

B.   L2TP

C.   PPTP

D.   IPSec

E.   MPLS

3: Which of the following statements are true of IPSec?

A.   It can encrypt/decrypt IP traffic only

B.   It can be used for authentication

C.   It can be used for Layer 2 VPN protocol

D.   It does not support multicast or broadcast

4: Which of the following are advantages of an SSL VPN?

A.   No additional software is required at the client's side

B.   Secure application access is possible from anywhere

C.   A large number of Web browsers are supported

D.   Several methods of authentication are supported

5: Which of the following are categories of QoS?

A.   Hybrid QoS

B.   Integrated services

C.   Best effort QoS

D.   Differentiated services

6: Which of the following are the components of the VPN?

A.   Authentication

B.   Encapsulation Method

C.   Data Encryption

D.   Packet Integrity

E.   Key Management

7: Which of the following key lengths are supported by AES?

A.   128

B.   192

C.   256

D.   512

E.   1024

8: Which of the following are the security concerns while using PPTP?

A.   Session Hijacking

B.   Data Manipulation

C.   No Header Information Protection

D.   Weak Encryption

9: Which of the following protocols are supported by PPTP?

A.   TCP/IP

B.   AppleTalk

C.   IPX

D.   NetBEUI

10: Which of the following topologies are possible in an IPSec VPN?

A.   Hub and Spoke Topology

B.   Bus Topology

C.   Full Mesh Topology

D.   Ring Topology

11: Which of the following are the most important issues in key management?

A.   Key Generation

B.   Key Encryption

C.   Key Distribution

D.   Key Backup

12: Which of the following ways can be used to generate SSL certificates?

A.   Self-generated

B.   Central SSL Certificate Authority

C.   SSL Authority

D.   Certificate Authority

13: Which of the following are IPSec modes?

A.   Hybrid Mode

B.   Virtual Mode

C.   Tunnel Mode

D.   Transport Mode

14: Which of the following protocols can be encapsulated with GRE?

A.   AppleTalk

B.   IP

C.   IPX

D.   DECnet

15: Which of the following are the components of a general MPLS VPN structure?

A.   Customer Edge Router

B.   Provider Edge Router

C.   Service Provider

D.   Customer

E.   Provider Router

16: Which of the following are the best practices for VPN security?

A.   Running virus scans on VPN servers and clients

B.   Reviewing the logs

C.   Disabling the account of the employee who leaves the organisation

D.   Scanning the VPN server for vulnerablities

E.   Using IDS

17: Which of the following are the most common VPN problems?

A.   Inablity to connect VPN server

B.   Inablity to connect hosts beyond VPN server

C.   Inablity to browse the LAN after log in

D.   Internet Connectivity

18: Which of the following are components of L2TP Transactions?

A.   Network Access Server

B.   L2TP access concentrator

C.   L2TP Network Client

D.   L2TP Network Server

19: Which of the following can be threats in an MPLS VPN?

A.   Intrusions from the internet

B.   Intrusions from an attached VPN

C.   DoS attack

D.   Internal threats

20: Which of the following are PPTP vulnerabilities?

A.   Cleartext passwords

B.   Key Management

C.   GRE Encapsulation

D.   Encryption

21: Which of the following are the best practices to choose a VPN service provider?

A.   It should offer strong encryption mechanism

B.   It should support for Layer 2 & Layer 3 tunneling protocols

C.   It should offer system level security

D.   It should have strong network backbone

22: Which of the following measures are taken by IPSec VPN to combat man-in-the-middle attack?

A.   Device authentication

B.   Using a firewall

C.   Integrity checking

D.   Encryption

23: Which of the following are the IPSec security protocols?

A.   Encapsulating Security Payload

B.   Encapsulating Security Protocol

C.   Authentication Heade

D.   Authorization Header

24: Which of the following are advantages of MPLS VPN?

A.   It supports various topologies

B.   It is scalable and flexible

C.   It offers encryption

D.   It is easy to implement and configure

25: Which of the following features should be evaluated in a VPN solution?

A.   Connectivity

B.   Protection

C.   Authentication

D.   Application Compatibility

E.   Management

26: Which of the following are advantages of DES and 3DES?

A.   They use symmetric keys

B.   They use asymmetric keys

C.   They make encryption faster

D.   They make encryption slow

27: Which of the following protocols can use authentication protocols such as RADIUS and TACACS+?

A.   PPTP

B.   L2TP

C.   L2F

D.   LT2P

28: Which of the following are functions of the keys?

A.   Repudiation

B.   Encryption

C.   Integrity

D.   Authentication

29: Which of the following are the authentication methods used in IPSec?

A.   Hashing algorithm

B.   Pre-shared keys

C.   Digital Certificates

D.   Digital Signatures

30: Which of the following sources can be used for testing interoperability between VPN vendors?

A.   VPNC

B.   IPSec-WIT

C.   CERT

D.   ICSA Labs

31: Which of the following protocols are supported by VPDN?

A.   PPTP

B.   PTPP

C.   L2TP

D.   L2F

E.   LF2

32: Which of the following are types of VPN attacks?

A.   DoS attack

B.   Attack against VPN protocols

C.   Cryptanalysis attacks

D.   Security threats to VPN elements

33: Which of the following are feartures of the IPSec Technology?

A.   Confidentiality

B.   Availability

C.   Integrity

D.   Anti-replay

34: Which of the following are widely used account databases?

A.   Primary Domain Controller

B.   RADIUS server

C.   TACACS server

D.   LDAP

E.   Novell Directory Service

35: Which of the following are the features of an MPLS VPN?

A.   It is connection-less

B.   It is encrypting

C.   It is non-encrypting

D.   It is scalable

36: Which of the following are the Layer 3 VPNs?

A.   MPLS

B.   PPTP

C.   ATM

D.   IPSec

37: Which of the following measures should be taken to make a DoS resistant network

A.   Correct Device Positioning

B.   Correct Bandwidth Planning

C.   Service Overprovisioning

D.   Anti-DoS solutions

38: Which port is used by L2TP?

A.   1701

B.   1702

C.   550

D.   4500

39: Which of the following protocols is used for key management?

A.   IKE

B.   L2TP

C.   PPTP

D.   IPSec

40: Which of the following statements is true of the Transport mode in IPSec?

A.   IPSec header is inserted between IP and Lower layer header

B.   IPSec header is inserted between IP and Upper layer header

C.   There is no IPSec header

D.   Only Authentication header is inserted

E.   Only Encapsulating Security Payload is inserted

41: To which of the following attacks is IPSec vulnerable to?

A.   Spoofing

B.   DoS attack

C.   Brute Force attack

D.   Key Management attack

42: Which of the following authorities issues Digital Certificates?

A.   Digital Certificate Authority

B.   Certificate Authority

C.   Central Certificate Authority

D.   Central Certificate Team

43: Which of the following symmetric algorithms has variable key length?

A.   MD5

B.   Triple DES

C.   DES

D.   Rivest Cipher 4

44: Which of the following services should be disabled on an MPLS VPN router?

A.   Finger

B.   TCP keepalives

C.   NTP

D.   Password encryption service

E.   CDP

45: Which of the following is a Hashing algorithm?

A.   Diffie-Hellman

B.   3-DES

C.   DES

D.   MD5

46: Which of the following ports is used by SSL?

A.   80

B.   443

C.   550

D.   4500

47: Which of the following port is used by L2F?

A.   UDP 1702

B.   UDP 1701

C.   TCP 1702

D.   TCP 1701

48: How does IPSec handle the confidentiality of a message?

A.   Through encryption

B.   Through authentication

C.   Through hashing

D.   Through sequence numbers

49: The act of learning information about the target network is called?

A.   DoS attack

B.   Encryption

C.   Repudiation

D.   Network reconnaissance

50: What is MPLS network?

A.   Multi Protocol Layer Switching

B.   Multi Protocol Label Switching

C.   Multi Protocol Link Switching

D.   Multi Protocol Label System

E.   Multi Protocol Layer System

51: The ability of a SSL VPN to receive user requests and relay them to internal server is_________.

A.   Relaying

B.   Reverse Relaying

C.   Reverse Proxying

D.   Forwarding

52: Which of the following is an Asymmetric algorithm?

A.   MD5

B.   El Gamal

C.   IDEA

D.   SHA-1

53: VPDN is a/an

A.   Application Layer VPN

B.   Session Layer VPN

C.   Transport Layer VPN

D.   Network Layer VPN

54: Which port is used by IKE(Internet Key Exchange) ?

A.   TCP 550

B.   TCP 500

C.   UDP 550

D.   UDP 500

55: How many modes are there in IKE Phase 1?

A.   1

B.   2

C.   3

D.   4

E.   5

56: How many keys are required if two parties communicate using Symmetric Cryptography?

A.   One

B.   Two

C.   Three

D.   Four

57: How many tunnels are supported by PPTP?

A.   1

B.   2

C.   3

D.   3

E.   5

58: Which of the following attacks is resembled by the following statement: "Inserting the packets of same sequence number into the data stream between a source and destination computer"?

A.   DNS poisioning

B.   Landc attack

C.   Smurf attack

D.   Replay attack

59: How many phases are there in IKE (Internet Key Exchange)?

A.   1

B.   2

C.   3

D.   4

E.   5

60: Which protocol is used by L2TP?

A.   TCP

B.   UDP

C.   RPC

D.   FTP

61: Which of the following tasks can be performed by GRE?

A.   Encryption

B.   Authentication

C.   Integrity Check

D.   Encapsulation

62: Which port is used for NAT-Traversal?

A.   TCP 4500

B.   TCP 4600

C.   UDP 4500

D.   UDP 4600

63: Which of the following protocols supports IKE?

A.   L2TP

B.   PPTP

C.   PTPP

D.   IPSec

64: To which of the following attacks is Diffie-Hellman algorithm vulnerable?

A.   Brute Force attack

B.   Dictionary attacks

C.   Spoofing attack

D.   Man-in-the-middle attack

65: How does anti-replay mechanism work in IPSec Technology?

A.   By Encryption

B.   By Hashing

C.   By Tracking Sequence Numbers

D.   By Authenitcation

66: Which of the following protocols is used by PPTP to tunnel packets?

A.   L2TP

B.   L2F

C.   PPP

D.   PTPP

67: What is CRL?

A.   Certificate Return List

B.   Certificate Revised List

C.   Certificate Revocation List

D.   Certificate Registration List

68: Which of the following is stored by MPLS in the routing table?

A.   IP address

B.   ARP

C.   Labels

D.   MAC address

69: Which of the following is a characteristic of MPLS VPN?

A.   It can be connection-less

B.   It can be connection -oriented

C.   It can be connection -less or connection oriented

D.   It can be both connection -less and connection-oriented

70: What is VPDN?:

A.   Virtual Private Dial-up Network

B.   Virtual Private Digital Network

C.   Virtual Personal Dial-up Network

D.   Virtual Personal Digital Network

71: How can you overcome the limitation of IPSec to support broadcast and multicast?

A.   Through Multicast Encryption

B.   Through Broadcast Encryption

C.   It cannot support them

D.   Through GRE Encapsulation

72: By which of the following can Man-in-the-middle attack be prevented?

A.   IKE

B.   Digital Signatures

C.   Cryptography

D.   Anti-virus

73: At which layer do SSL VPNs work in the OSI model?

A.   At the Application Layer

B.   At the Presentation Layer

C.   At the Session Layer

D.   At the Transport Layer

E.   At the Network Layer

74: Which protocol is used by PPTP?

A.   TCP

B.   UDP

C.   RPC

D.   FTP

75: Which port is used by PPTP?

A.   500

B.   550

C.   1723

76: Which of the following VPN protocols is resistant to Denial-of-Service attack?

A.   PPTP

B.   L2TP

C.   IPSec

D.   L2F

77: How many key combinations are possible if the length of the key is 56 bits?

A.   255

B.   2128

C.   2256

D.   2512

78: Which of the following VPN protocols are vulnerable to Brute Force attack?

A.   PPTP

B.   PTPP

C.   IPSec

D.   L2TP

E.   LTTP

79: Which of the following VPN protocols support multiple tunnels?

A.   PPTP

B.   L2TP

C.   IPSec

D.   NTP

80: Which of the following protocols is supported by IPSec?

A.   TCP/IP

B.   AppleTalk

C.   IPX

D.   NetBEUI

81: Data sent through a virtual private network (vpn) can be encrypted using the _____.

A.   Layer Two Tunneling Protocol

B.   Transmission Control Protocol

C.   Internet Control Message Protocol

D.   User Datagram Protocol

82: Vpns are known as a _____ protocol.

A.   Connectionless

B.   Data link layer

C.   Tunneling

D.   Network layer

83: The biggest advantage to a virtual network approach is _____ and _____ on a global scale.

A.   Coordination; organization

B.   Communication; organization

C.   Flexibility; competitiveness

D.   Flexibility; coordination

84: Many outgoing email servers use ____ as a set of rules for communicating with other computers.

A.   HTML

B.   ISP

C.   POP

D.   SMTP