What we have here is a VPN practice test MCQ quiz trivia! The Virtual Private Network is almost everyone’s answer to having anonymity and secrecy when they are using the internet. It protects one from being tracked and gives access to banned or restricted websites with ease. What makes VPN so secure for internet users and how do you know the one you are using is secure. Check your VPN knowledge now!
It is a secure network
It is deployed over a shared infrastructure
It may use tunneling techniques
It does not provide any cost savings to alternate connectivity options
Rate this question:
Asymmetrical encryption
Symmetrical encryption
Secure Hash Function
Public Key Infrastructure
Rate this question:
Router
Firewall
Concentrator
All of the above
Rate this question:
Data Confidentiality
Origin Authentication
Data Integrity
Protection from Spyware
Rate this question:
Data confidentiality (privacy from eavesdropping)
Data Integrity (data protected from being changed during transit)
Securely negotiating a key over a unsecure media
Anti replay protection
Rate this question:
The IPSEC tunnel is established
Phase III of ISAKMP commences
The IPSEC tunnel is torn down and renegotiated
An interim secure channel is established
Rate this question:
PPTP
IPSEC
L2TP
L2F
Rate this question:
Encryption
Key Exchange
Hashing
Scrambling
Rate this question:
Pre-Shared Keys
Digital Certificates
All the above
Peer authentication is not performed during Phase 1 of ISAKMP
Rate this question:
Diffie-Hellman Key Exchange
Advanced Encryption Standard (AES)
Secure Hashing Algorithm (SHA)
None of the above
Rate this question:
Negotiate ISAKMP SAs
Negotiate IPSEC SAs
Perform peer authentication
Perform initial Diffie-Hellman Key Exchange
Rate this question:
Split tunneling
Load Balancing
Firewalling
Dual Stack tunneling
Rate this question:
Negotiate ISAKMP SAs
Negotiate IPSEC SAs
Perform peer authentication
Perform initial Diffie-Hellman Key Exchange
Rate this question:
Key exchange
Encryption
All of the above
Hashing
Rate this question:
51
53
50
500
Rate this question:
DES has the least cryptographic strength
3DES is strong but has high CPU overhead
AES offers a good balance of cryptographic strength and CPU overhead
AES has export restrictions associated with it
Rate this question:
Directly above IP with protocol number 50
Above UDP with port number 500
Above TCP with port number 500
Over AH/ESP with port number 500
Rate this question:
Peer Authentication using digital certificates during Phase 1 of ISAKMP
Per User Authentication when connecting from VPN client to VPN concentrator
AES encryption for confidentiality
An IPSEC tunnel operating in transport mode
Rate this question:
Data Confidentiality (encryption)
Origin Authentication
Data Integrity
Protection against Anti Replay attacks
Rate this question:
It automates the IPSEC tunnel establishment process
It allows symmetric keys used by encryption and hashing algorithms to be negotiated dynamically
It gives a lifetime to the tunnel, after which the tunnel expires and is reestablished
It reduces the overheads associated with IPSEC tunnel establishment
Rate this question:
Quiz Review Timeline (Updated): Feb 12, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.