MCQs > IT & Programming > Virtual Private Network - VPN MCQs > Basic Virtual Private Network - VPN MCQs

Basic Virtual Private Network - VPN MCQ

1. Many outgoing email servers use ____ as a set of rules for communicating with other computers.

Answer

Correct Answer: SMTP

Note: This Question is unanswered, help us to find answer for this one

2. The biggest advantage to a virtual network approach is _____ and _____ on a global scale.

Answer

Correct Answer: Flexibility; competitiveness

Note: This Question is unanswered, help us to find answer for this one

3. Vpns are known as a _____ protocol.

Answer

Correct Answer: Tunneling

Note: This Question is unanswered, help us to find answer for this one

4. Data sent through a virtual private network (vpn) can be encrypted using the _____.

Answer

Correct Answer: Layer Two Tunneling Protocol

Note: This Question is unanswered, help us to find answer for this one

5. Which of the following protocols is supported by IPSec?

Answer

Correct Answer: TCP/IP

Note: This Question is unanswered, help us to find answer for this one

6. Which of the following VPN protocols support multiple tunnels?

Answer

Correct Answer: L2TP
IPSec

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

7. Which of the following VPN protocols are vulnerable to Brute Force attack?

Answer

Correct Answer: L2TP

Note: This Question is unanswered, help us to find answer for this one

8. How many key combinations are possible if the length of the key is 56 bits?

Answer

Correct Answer: 255

Note: This Question is unanswered, help us to find answer for this one

9. Which of the following VPN protocols is resistant to Denial-of-Service attack?

Answer

Correct Answer: IPSec

Note: This Question is unanswered, help us to find answer for this one

10. Which port is used by PPTP?

Answer

Correct Answer: 1723

Note: This Question is unanswered, help us to find answer for this one

11. Which protocol is used by PPTP?

Answer

Correct Answer: TCP

Note: This Question is unanswered, help us to find answer for this one

12. At which layer do SSL VPNs work in the OSI model?

Answer

Correct Answer: At the Session Layer

Note: This Question is unanswered, help us to find answer for this one

13. By which of the following can Man-in-the-middle attack be prevented?

Answer

Correct Answer: Digital Signatures

Note: This Question is unanswered, help us to find answer for this one

14. How can you overcome the limitation of IPSec to support broadcast and multicast?

Answer

Correct Answer: Through GRE Encapsulation

Note: This Question is unanswered, help us to find answer for this one

15. What is VPDN?:

Answer

Correct Answer: Virtual Private Dial-up Network

Note: This Question is unanswered, help us to find answer for this one

16. Which of the following is a characteristic of MPLS VPN?

Answer

Correct Answer: It can be connection-less

Note: This Question is unanswered, help us to find answer for this one

17. Which of the following is stored by MPLS in the routing table?

Answer

Correct Answer: Labels

Note: This Question is unanswered, help us to find answer for this one

18. What is CRL?

Answer

Correct Answer: Certificate Revocation List

Note: This Question is unanswered, help us to find answer for this one

19. Which of the following protocols is used by PPTP to tunnel packets?

Answer

Correct Answer: PPP

Note: This Question is unanswered, help us to find answer for this one

20. How does anti-replay mechanism work in IPSec Technology?

Answer

Correct Answer: By Tracking Sequence Numbers

Note: This Question is unanswered, help us to find answer for this one

21. To which of the following attacks is Diffie-Hellman algorithm vulnerable?

Answer

Correct Answer: Man-in-the-middle attack

Note: This Question is unanswered, help us to find answer for this one

22. Which of the following protocols supports IKE?

Answer

Correct Answer: IPSec

Note: This Question is unanswered, help us to find answer for this one

23. Which port is used for NAT-Traversal?

Answer

Correct Answer: UDP 4500

Note: This Question is unanswered, help us to find answer for this one

24. Which of the following tasks can be performed by GRE?

Answer

Correct Answer: Encapsulation

Note: This Question is unanswered, help us to find answer for this one

25. Which protocol is used by L2TP?

Answer

Correct Answer: UDP

Note: This Question is unanswered, help us to find answer for this one

26. How many phases are there in IKE (Internet Key Exchange)?

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

27. Which of the following attacks is resembled by the following statement: "Inserting the packets of same sequence number into the data stream between a source and destination computer"?

Answer

Correct Answer: Replay attack

Note: This Question is unanswered, help us to find answer for this one

28. How many tunnels are supported by PPTP?

Answer

Correct Answer: 1

Note: This Question is unanswered, help us to find answer for this one

29. How many keys are required if two parties communicate using Symmetric Cryptography?

Answer

Correct Answer: One

Note: This Question is unanswered, help us to find answer for this one

30. How many modes are there in IKE Phase 1?

Answer

Correct Answer: 2

Note: This Question is unanswered, help us to find answer for this one

31. Which port is used by IKE(Internet Key Exchange) ?

Answer

Correct Answer: UDP 500

Note: This Question is unanswered, help us to find answer for this one

32. VPDN is a/an

Answer

Correct Answer: Network Layer VPN

Note: This Question is unanswered, help us to find answer for this one

33. Which of the following is an Asymmetric algorithm?

Answer

Correct Answer: El Gamal

Note: This Question is unanswered, help us to find answer for this one

34. The ability of a SSL VPN to receive user requests and relay them to internal server is_________.

Answer

Correct Answer: Reverse Proxying

Note: This Question is unanswered, help us to find answer for this one

35. What is MPLS network?

Answer

Correct Answer: Multi Protocol Label Switching

Note: This Question is unanswered, help us to find answer for this one

36. The act of learning information about the target network is called?

Answer

Correct Answer: Network reconnaissance

Note: This Question is unanswered, help us to find answer for this one

37. How does IPSec handle the confidentiality of a message?

Answer

Correct Answer: Through encryption

Note: This Question is unanswered, help us to find answer for this one

38. Which of the following port is used by L2F?

Answer

Correct Answer: UDP 1701

Note: This Question is unanswered, help us to find answer for this one

39. Which of the following ports is used by SSL?

Answer

Correct Answer: 443

Note: This Question is unanswered, help us to find answer for this one

40. Which of the following is a Hashing algorithm?

Answer

Correct Answer: MD5

Note: This Question is unanswered, help us to find answer for this one

41. Which of the following services should be disabled on an MPLS VPN router?

Answer

Correct Answer: Finger
NTP
CDP

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

42. Which of the following symmetric algorithms has variable key length?

Answer

Correct Answer: Rivest Cipher 4

Note: This Question is unanswered, help us to find answer for this one

43. Which of the following authorities issues Digital Certificates?

Answer

Correct Answer: Certificate Authority

Note: This Question is unanswered, help us to find answer for this one

44. To which of the following attacks is IPSec vulnerable to?

Answer

Correct Answer: Key Management attack

Note: This Question is unanswered, help us to find answer for this one

45. Which of the following statements is true of the Transport mode in IPSec?

Answer

Correct Answer: IPSec header is inserted between IP and Upper layer header

Note: This Question is unanswered, help us to find answer for this one

46. Which of the following protocols is used for key management?

Answer

Correct Answer: IKE

Note: This Question is unanswered, help us to find answer for this one

47. Which port is used by L2TP?

Answer

Correct Answer: 1701

Note: This Question is unanswered, help us to find answer for this one

48. Which of the following measures should be taken to make a DoS resistant network

Answer

Correct Answer: Correct Device Positioning
Correct Bandwidth Planning
Service Overprovisioning
Anti-DoS solutions

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

49. Which of the following are the Layer 3 VPNs?

Answer

Correct Answer: MPLS
IPSec

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

50. Which of the following are the features of an MPLS VPN?

Answer

Correct Answer: It is connection-less
It is non-encrypting
It is scalable

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

51. Which of the following are widely used account databases?

Answer

Correct Answer: Primary Domain Controller
RADIUS server
TACACS server
LDAP
Novell Directory Service

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

52. Which of the following are feartures of the IPSec Technology?

Answer

Correct Answer: Confidentiality
Availability
Integrity
Anti-replay

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

53. Which of the following are types of VPN attacks?

Answer

Correct Answer: DoS attack
Attack against VPN protocols
Cryptanalysis attacks
Security threats to VPN elements

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

54. Which of the following protocols are supported by VPDN?

Answer

Correct Answer: PPTP
L2TP
L2F

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

55. Which of the following sources can be used for testing interoperability between VPN vendors?

Answer

Correct Answer: VPNC
IPSec-WIT
ICSA Labs

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

56. Which of the following are the authentication methods used in IPSec?

Answer

Correct Answer: Pre-shared keys
Digital Certificates

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

57. Which of the following are functions of the keys?

Answer

Correct Answer: Encryption
Integrity
Authentication

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

58. Which of the following protocols can use authentication protocols such as RADIUS and TACACS+?

Answer

Correct Answer: L2TP
L2F

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

59. Which of the following are advantages of DES and 3DES?

Answer

Correct Answer: They use symmetric keys
They make encryption faster

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

60. Which of the following features should be evaluated in a VPN solution?

Answer

Correct Answer: Connectivity
Protection
Authentication
Application Compatibility
Management

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

61. Which of the following are advantages of MPLS VPN?

Answer

Correct Answer: It supports various topologies
It is scalable and flexible
It is easy to implement and configure

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

62. Which of the following are the IPSec security protocols?

Answer

Correct Answer: Encapsulating Security Payload
Authentication Heade

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

63. Which of the following measures are taken by IPSec VPN to combat man-in-the-middle attack?

Answer

Correct Answer: Device authentication
Integrity checking
Encryption

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

64. Which of the following are the best practices to choose a VPN service provider?

Answer

Correct Answer: It should offer strong encryption mechanism
It should support for Layer 2 & Layer 3 tunneling protocols
It should offer system level security
It should have strong network backbone

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

65. Which of the following are PPTP vulnerabilities?

Answer

Correct Answer: Cleartext passwords
GRE Encapsulation

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

66. Which of the following can be threats in an MPLS VPN?

Answer

Correct Answer: Intrusions from the internet
Intrusions from an attached VPN
DoS attack
Internal threats

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

67. Which of the following are components of L2TP Transactions?

Answer

Correct Answer: Network Access Server
L2TP access concentrator
L2TP Network Server

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

68. Which of the following are the most common VPN problems?

Answer

Correct Answer: Inablity to connect VPN server
Inablity to connect hosts beyond VPN server
Inablity to browse the LAN after log in
Internet Connectivity

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

69. Which of the following are the best practices for VPN security?

Answer

Correct Answer: Running virus scans on VPN servers and clients
Reviewing the logs
Disabling the account of the employee who leaves the organisation
Scanning the VPN server for vulnerablities
Using IDS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

70. Which of the following are the components of a general MPLS VPN structure?

Answer

Correct Answer: Customer Edge Router
Provider Edge Router
Service Provider
Customer
Provider Router

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

71. Which of the following protocols can be encapsulated with GRE?

Answer

Correct Answer: AppleTalk
IP
IPX
DECnet

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

72. Which of the following are IPSec modes?

Answer

Correct Answer: Tunnel Mode
Transport Mode

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

73. Which of the following ways can be used to generate SSL certificates?

Answer

Correct Answer: Self-generated
Certificate Authority

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

74. Which of the following are the most important issues in key management?

Answer

Correct Answer: Key Generation
Key Distribution
Key Backup

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

75. Which of the following topologies are possible in an IPSec VPN?

Answer

Correct Answer: Hub and Spoke Topology
Full Mesh Topology

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

76. Which of the following protocols are supported by PPTP?

Answer

Correct Answer: TCP/IP
IPX
NetBEUI

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

77. Which of the following are the security concerns while using PPTP?

Answer

Correct Answer: Session Hijacking
Data Manipulation
No Header Information Protection
Weak Encryption

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

78. Which of the following key lengths are supported by AES?

Answer

Correct Answer: 128
192
256

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

79. Which of the following are the components of the VPN?

Answer

Correct Answer: Authentication
Encapsulation Method
Data Encryption
Packet Integrity
Key Management

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

80. Which of the following are categories of QoS?

Answer

Correct Answer: Integrated services
Best effort QoS
Differentiated services

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

81. Which of the following are advantages of an SSL VPN?

Answer

Correct Answer: No additional software is required at the client's side
Secure application access is possible from anywhere
A large number of Web browsers are supported
Several methods of authentication are supported

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

82. Which of the following statements are true of IPSec?

Answer

Correct Answer: It can encrypt/decrypt IP traffic only
It does not support multicast or broadcast

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

83. Which of the following are the types of VPN?

Answer

Correct Answer: GRE
L2TP
PPTP
IPSec
MPLS

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

84. Due to which of the following reasons do you need to revoke a certificate?

Answer

Correct Answer: The private key used for authentication has been compromised
The identity certificate has been compromised
The certificate is no longer used
The certificate has expired

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one