Virtual Private Networks VPN Mcqs
Q.1: Many outgoing email servers use ____ as a set of rules for communicating with other computers.^
A. HTML
B. ISP
C. POP
D. SMTP
Q.2: The biggest advantage to a virtual network approach is _____ and _____ on a global scale.Y
A. Coordination; organization
B. Communication; organization
C. Flexibility; competitiveness
D. Flexibility; coordination
Q.3: Vpns are known as a _____ protocol.#
A. Connectionless
B. Data link layer
C. Tunneling
D. Network layer
Q.4: Data sent through a virtual private network (vpn) can be encrypted using the _____.S
A. Layer Two Tunneling Protocol
B. Transmission Control Protocol
C. Internet Control Message Protocol!
D. User Datagram Protocol
Q.5: Which of the following protocols is supported by IPSec?7
A. TCP/IP
B. AppleTalk
C. IPX
D. NetBEUI
Q.6: Which of the following VPN protocols support multiple tunnels?>
A. PPTP
B. L2TP
C. IPSec
D. NTP
Q.7: Which of the following VPN protocols are vulnerable to Brute Force attack?J
A. PPTP
B. PTPP
C. L2TP
D. L2TP
Q.8: How many key combinations are possible if the length of the key is 56 bits?K
A. 255
B. 2128
C. 2256
D. 2512
Q.9: Which of the following VPN protocols is resistant to Denial-of-Service attack?N
A. PPTP
B. L2TP
C. IPSec
D. L2F
Q.10: Which port is used by PPTP?
A. 500
B. 550
C. No Option
D. No Option

Related Mcqs

All Subject Mcqs