Below you can find our answers to the most common quiz questions around VPN’s:
Which process is used to protect transmitted data in a VPN?
Symmetric key encryption and public-key encryption
What dedicated hardware device aggregates hundreds or thousands of VPN connections?
A VPN concentrator
What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?
Tunneling protocols allowing for two-way data traffic encryption
When employees have multiple concurrent connections, what might be happening to the VPN system?
A VPN system may be dealing with a network overload
Before IPSec can be used as a virtual private network (VPN) service, what must be created?
A secure client-server connection based on a trusted certificate
Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication?
Layer Two Tunneling Protocol (L2TP)
Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet?
The IP security (IPSec)
Which VPN topology is also known as a hub-and-spoke configuration?
A centralized VPN structure which uses a single tunnel to reroute traffic
Which VPN tunneling protocol uses IPSec with 3DES for data confidentiality?
ESP, short for “Encapsulating/Encapsulated Security Payload.”
What UDP port is used for IKE traffic from a VPN client to server?
Protocol port 500, 4500, or both
Which VPN protocol leverages web-based applications?
Secure Sockets Layer (SSL)
For domain-joined computers, what is the simplest way to configure VPN connections?
Group Policy Preferences
How does a virtual private network (VPN) provide additional security over other types of networks?
A VPN will both handle all of your system traffic by encrypting it, and then anonymize it with a fake IP address