VPN (Amit Tanwar)
Which of the following is not a feature of a VPN?
It is a secure network
It may use tunneling techniques
It is deployed over a shared infrastructure
It does not provide any cost savings to alternate connectivity options
What does VPN stand for?
Virtual Private Network
Virtual Public Network
Virtual Personal Network
Virtual Processing Network
A service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.
SSL
Firewall
TSL
VPN
Which of the following security technique provides the highest "confidentiality service"?
Hashing
Encryption
Key exchange
Firewall
Q. What is the function of VPN client (software)? (choose all applicable)
Encrypts data
Alters the IP address
Transmits data packages
Alters the MAC address
Q. Which of the following is not a way VPN solves the privacy and security problems?
The destination site sees the VPN server as the traffic origin, not you
No one can (easily) identify you or your computer as the source of the data, nor what you’re doing.
Your data is encrypted, so even if someone does look at what you’re sending, they only see encrypted information and not raw data.
It activates the Intrusion Detection System against active and passive threats
Q. It’s based on SSL/TLS and it’s an open source project, which means that it’s constantly being improved by hundreds of developers. It secures the connection by using keys that are known only by the two participating parties on either end of the transmission.
OpenVPN protocol
IKEv2 Protocol
SSTP
PPTP
Q. Which of the below scenarios require the use of VPN the most?
WiFi in home
WiFi in school
WiFi in a workplace
WiFi in a coffee shop
Q. Which of the following may want to use the VPN the least?
Individuals
Organisations
Businesses
Governments
Q. If you telework, for the security and privacy sakes which technology you need the most?
Firewall
VPN
500 mbps internet connection
A pc with i8 processor
Q. VPN protects your privacy. Which of the following is the technique VPN uses to do so?
Tunneling
Backchanneling
Hiding your MAC address
Enabling protection tools like anti-virus programs
Q. Using a VPN means adding in another ...... into the communication between your computer and the requested web server.
Layer onto OSI Model
Firewall
ISP
Server
Q. Protecting information and communications through the use of mathematical formulas is called ... .
Encryption
Authentication
Integrity
Cryptography
Q. Encoding simple text and other information that can be accessed by the authorized entity with a decryption key is called ... .
Encryption
Authentication
Hashing
Cryptography
Q. The type of encryption uses the same key (two keys which are identical) for both encrypting and decrypting data.
Symmetric Encryption
Asymmetric Encryption
Q. The type of encryption uses mathematically related pair of keys for one for encrypting and the other for decrypting data.
Symmetric Encryption
Asymmetric Encryption
Q. Which of the following is not an advantage of using VPN?
Provides anonymity to individuals.
Teleworkers in organizations with global offices and partners share data in a private manner.
Reduces the risk of interception.
Allows governments to track users' browsing history.
{"name":"VPN (Amit Tanwar)", "url":"https://www.quiz-maker.com/QW17VXLYK","txt":"Which of the following is not a feature of a VPN?, What does VPN stand for?, A service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}