Correct Answer:
SMTP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Flexibility; competitiveness
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Tunneling
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Layer Two Tunneling Protocol
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP/IP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
L2TP
IPSec
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
L2TP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
255
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IPSec
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
1723
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
At the Session Layer
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Digital Signatures
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Through GRE Encapsulation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Virtual Private Dial-up Network
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It can be connection-less
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Labels
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Certificate Revocation List
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
PPP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
By Tracking Sequence Numbers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Man-in-the-middle attack
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IPSec
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
UDP 4500
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encapsulation
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
UDP
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
2
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Replay attack
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
1
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
One
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
2
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
UDP 500
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network Layer VPN
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
El Gamal
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Reverse Proxying
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Multi Protocol Label Switching
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network reconnaissance
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Through encryption
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
UDP 1701
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
443
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
MD5
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Finger
NTP
CDP
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Rivest Cipher 4
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Certificate Authority
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Key Management attack
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IPSec header is inserted between IP and Upper layer header
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
IKE
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
1701
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Correct Device Positioning
Correct Bandwidth Planning
Service Overprovisioning
Anti-DoS solutions
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
MPLS
IPSec
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It is connection-less
It is non-encrypting
It is scalable
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Primary Domain Controller
RADIUS server
TACACS server
LDAP
Novell Directory Service
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Confidentiality
Availability
Integrity
Anti-replay
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
DoS attack
Attack against VPN protocols
Cryptanalysis attacks
Security threats to VPN elements
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
PPTP
L2TP
L2F
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
VPNC
IPSec-WIT
ICSA Labs
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Pre-shared keys
Digital Certificates
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encryption
Integrity
Authentication
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
L2TP
L2F
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
They use symmetric keys
They make encryption faster
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Connectivity
Protection
Authentication
Application Compatibility
Management
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It supports various topologies
It is scalable and flexible
It is easy to implement and configure
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Encapsulating Security Payload
Authentication Heade
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Device authentication
Integrity checking
Encryption
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It should offer strong encryption mechanism
It should support for Layer 2 & Layer 3 tunneling protocols
It should offer system level security
It should have strong network backbone
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Cleartext passwords
GRE Encapsulation
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Intrusions from the internet
Intrusions from an attached VPN
DoS attack
Internal threats
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Network Access Server
L2TP access concentrator
L2TP Network Server
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Inablity to connect VPN server
Inablity to connect hosts beyond VPN server
Inablity to browse the LAN after log in
Internet Connectivity
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Running virus scans on VPN servers and clients
Reviewing the logs
Disabling the account of the employee who leaves the organisation
Scanning the VPN server for vulnerablities
Using IDS
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Customer Edge Router
Provider Edge Router
Service Provider
Customer
Provider Router
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
AppleTalk
IP
IPX
DECnet
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Tunnel Mode
Transport Mode
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Self-generated
Certificate Authority
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Key Generation
Key Distribution
Key Backup
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Hub and Spoke Topology
Full Mesh Topology
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
TCP/IP
IPX
NetBEUI
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Session Hijacking
Data Manipulation
No Header Information Protection
Weak Encryption
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
128
192
256
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Authentication
Encapsulation Method
Data Encryption
Packet Integrity
Key Management
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
Integrated services
Best effort QoS
Differentiated services
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
No additional software is required at the client's side
Secure application access is possible from anywhere
A large number of Web browsers are supported
Several methods of authentication are supported
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
It can encrypt/decrypt IP traffic only
It does not support multicast or broadcast
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
GRE
L2TP
PPTP
IPSec
MPLS
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Correct Answer:
The private key used for authentication has been compromised
The identity certificate has been compromised
The certificate is no longer used
The certificate has expired
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Virtual Private Network - VPN MCQs | Topic-wise