
Level 3 - VPNs Quiz
Authored by Eric Jones
others
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which VPN tunneling protocol developed by Microsoft uses standard authentication protocols such as CHAP and PAP?
a) SSL
b) PPTP
c) IPsec
d) GRE
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a site-to-site VPN, what is the role of routers at the edge of each site?
a) They connect directly to each host in the network.
b) They only communicate with the VPN concentrator.
c) They establish a VPN with the router at the other location.
d) They act as the endpoint for the client-to-site configuration.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key characteristic of IPsec that sets it apart from other VPN protocols?
a) It supports multiple protocols, not just IP.
b) It uses standard authentication protocols such as CHAP and PAP.
c) It includes protocols for authentication, data encryption, and connection negotiation.
d) It uses TCP port 1723.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a Dynamic Multipoint Virtual Private Network (DMVPN) allow that other VPN configurations do not?
a) DMVPN uses SSL for tunneling.
b) DMVPN supports more than one connection through a VPN.
c) DMVPN uses standard authentication protocols such as CHAP and PAP.
d) DMVPN does not offer any type of encryption.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which protocol ensures that messages being transmitted on the internet are private and tamper-proof and is used to increase security by encrypting data using public key cryptography?
a) SSL
b) PPTP
c) DTLS
d) TLS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A VPN is used primarily to support secure communications over what type of network?
a) A trusted network
b) A local area network
c) An untrusted network
d) A secure network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary difference between a host-to-host VPN and a remote access VPN?
a) The devices required to create the VPN connection.
b) The type of encryption used.
c) The VPN tunneling protocol used.
d) The type of network over which the VPN is used.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?