What we have here is a VPN practice test MCQ quiz trivia! The Virtual Private Network is almost everyone’s answer to having anonymity and secrecy when they are using the internet. It protects one from being tracked and gives access to banned or restricted websites with ease. What makes VPN so secure for internet users and how do you know the one you are using is secure. Check your VPN knowledge now!
It is a secure network
It is deployed over a shared infrastructure
It may use tunneling techniques
It does not provide any cost savings to alternate connectivity options
Remote access VPN
Site to site VPN
Extranet VPN
LAN to LAN VPN
Router
Router
Concentrator
All of the above
PPTP
IPSEC
L2TP
L2F
Hashing
Key exchange
Encryption
All of the above
Asymmetrical encryption
Symmetrical encryption
Secure Hash Function
Public Key Infrastructure
DES has the least cryptographic strength
3DES is strong but has high CPU overhead
AES offers a good balance of cryptographic strength and CPU overhead
AES has export restrictions associated with it
Encryption
Key Exchange
Hashing
Scrambling
Data confidentiality (privacy from eavesdropping)
Data Integrity (data protected from being changed during transit)
Securely negotiating a key over a unsecure media
Anti replay protection
Diffie-Hellman Key Exchange
Advanced Encryption Standard (AES)
Secure Hashing Algorithm (SHA)
None of the above
Data Confidentiality
Origin Authentication
Data Integrity
Protection from Spy Ware
Data Confidentiality (encryption)
Origin Authentication
Data Integrity
Protection against Anti Replay attacks
51
53
50
500
Negotiate ISAKMP SAs
Negotiate IPSEC SAs
Perform peer authentication
Perform initial Diffie-Hellman Key Exchange
Negotiate ISAKMP SAs
Negotiate IPSEC SAs
Perform peer authentication
Perform initial Diffie-Hellman Key Exchange
The IPSEC tunnel is established
Phase III of ISAKMP commences
The IPSEC tunnel is torn down and renegotiated
An interim secure channel is established
It automates the IPSEC tunnel establishment process
It allows symmetric keys used by encryption and hashing algorithms to be negotiated dynamically
It gives a lifetime to the tunnel, after which the tunnel expires and is reestablished
It reduces the overheads associated with IPSEC tunnel establishment
Directly above IP with protocol number 50
Above UDP with port number 500
Above TCP with port number 500
Over AH/ESP with port number 500
Pre-Shared Keys
Digital Certificates
All the above
Peer authentication is not performed during Phase 1 of ISAKMP
Peer Authentication using digital certificates during Phase 1 of ISAKMP
Per User Authentication when connecting from VPN client to VPN concentrator
AES encryption for confidentiality
An IPSEC tunnel operating in transport mode
Split tunneling
Load Balancing
Firewalling
Dual Stack tunneling
Wait!
Here's an interesting quiz for you.