ADVERTISEMENT
ADVERTISEMENT

Networking | VPN Aptitude Questions and Answers

Networking | VPN Aptitude Questions and Answers: This section contains aptitude questions and answers on Networking | Virtual Private Network (VPN).
Submitted by Nidhi, on June 01, 2021

1) There are the following statements that are given below, which of them are correct about VPN?

  1. VPN stands for Virtual Private Network.
  2. It is a technology that is used to create a secured connection over a less secured network.
  3. Using the VPN, we can extend our private network using the internet.
  4. All of the above

Options:

  1. A and B
  2. A and C
  3. B and C
  4. D

2) Which of the following statements are the correct advantages of a VPN?

  1. The destination cannot find your private network as a traffic origin.
  2. Communication using VPN is done in an encrypted manner.
  3. This is used to hide your identity to protect from hackers.
  4. VPN implementation does not require any kind of server.

Options:

  1. A and B
  2. A, B, and C
  3. B, C, and D
  4. A, B, C, and D

3) Which of the following are correct VPN protocols?

  1. PPTP
  2. L2TP
  3. SSTP
  4. OpenVPN

Options:

  1. A and B
  2. A, B, and C
  3. B, C, and D
  4. A, B, C, and D

4) What is the full form of SSTP protocol?

  1. Secure Socket Tunneling Protocol
  2. Secure Service Tunneling Protocol
  3. Secure Server Tunneling Protocol
  4. Secure Saver Tunneling Protocol

5) Who was developed SSTP protocol?

  1. Microsoft
  2. IBM
  3. CISCO
  4. GOOGLE

ADVERTISEMENT

6) There are the following statements that are given below, which of them are correct about OpenVPN protocol?

  1. This protocol uses SSL/TLS based communication.
  2. It is an open-source project, improved by hundreds of developers.
  3. It is not an open-source protocol.
  4. None of the above.

Options:

  1. A and B
  2. A, B, and C
  3. B, C, and D
  4. A, B, C, and D

7) Implementation of a VPN is legal or not?

  1. Legal in all countries
  2. Legal in some countries

8) Which of the following are the parts of VPN logs?

  1. User activities
  2. Devices used
  3. IP addresses
  4. Connection and disconnection timestamps

Options:

  1. A and B
  2. A, B, and C
  3. B, C, and D
  4. A, B, C, and D

9) The implementation of a VPN can be free of cost?

  1. Yes
  2. No

10) The VPN can be used for torrenting?

  1. Yes
  2. No

ADVERTISEMENT

11) Which of the following protocol is not used for a VPN?

  1. L2TP
  2. IKEv2
  3. PPTP
  4. None of the above

12) Which of the following countries does not legalize the VPN implementation?

  1. China
  2. UAE
  3. Iraq
  4. North Korea

Options:

  1. A and B
  2. A and C
  3. A, B, and C
  4. A, B, C, and D

13) Which of following VPN’s supports torrenting?

  1. NordVPN
  2. Surfshark
  3. EncVPN
  4. ExpressVPN

Options:

  1. A and B
  2. A and C
  3. A, B, and D
  4. A, B, C, and D

14) Which of following VPN’s works on the Android operating system?

  1. NordVPN
  2. AndrVPN
  3. Surfshark
  4. ExpressVPN

Options:

  1. A and B
  2. A , C, and D
  3. A, B, and D
  4. A, B, C, and D

15) Can VPN and Tor work together?

  1. Yes
  2. No

ADVERTISEMENT



ADVERTISEMENT



Comments and Discussions


ADVERTISEMENT

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT

Languages: » C » C++ » C++ STL » Java » Data Structure » C#.Net » Android » Kotlin » SQL
Web Technologies: » PHP » Python » JavaScript » CSS » Ajax » Node.js » Web programming/HTML
Solved programs: » C » C++ » DS » Java » C#
Aptitude que. & ans.: » C » C++ » Java » DBMS
Interview que. & ans.: » C » Embedded C » Java » SEO » HR
CS Subjects: » CS Basics » O.S. » Networks » DBMS » Embedded Systems » Cloud Computing
» Machine learning » CS Organizations » Linux » DOS
More: » Articles » Puzzles » News/Updates

© https://www.includehelp.com some rights reserved.