Do you know that? 52% freelancers have more free time now than they did as employees. next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Upwork (oDesk) test answers << Networking category

Test answers for Virtual Private Network Test 2016

(75 / 3) Last updated: March 25
Upwork (oDesk) • Networking
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

75 Answered Test Questions:

1. Due to which of the following reasons do you need to revoke a certificate?

Answers:

• The private key used for authentication has been compromised

• The identity certificate has been compromised

• The certificate is no longer used

• The certificate has expired

2. Which of the following are the types of VPN?

Answers:

• GRE

• L2TP

• PPTP

• IPSec

• MPLS

3. Which of the following statements are true of IPSec?

Answers:

• It can encrypt/decrypt IP traffic only

• It can be used for authentication

• It can be used for Layer 2 VPN protocol

• It does not support multicast or broadcast

• It supports only multicast

4. Which of the following are advantages of an SSL VPN?

Answers:

• No additional software is required at the client's side

• Secure application access is possible from anywhere

• A large number of Web browsers are supported

• Several methods of authentication are supported

5. Which of the following are categories of QoS?

Answers:

• Hybrid QoS

• Integrated services

• Best effort QoS

• Differentiated services

6. Which of the following are the components of the VPN?

Answers:

• Authentication

• Encapsulation Method

• Data Encryption

• Packet Integrity

• Key Management

7. Which of the following key lengths are supported by AES?

Answers:

• 128

• 192

• 256

• 512

• 1024

8. Which of the following are the security concerns while using PPTP?

Answers:

• Session Hijacking

• Data Manipulation

• No Header Information Protection

• Weak Encryption

9. Which of the following protocols are supported by PPTP?

Answers:

• TCP/IP

• AppleTalk

• IPX

• NetBEUI

10. Which of the following topologies are possible in an IPSec VPN?

Answers:

• Hub and Spoke Topology

• Bus Topology

• Full Mesh Topology

• Ring Topology

11. Which of the following are the most important issues in key management?

Answers:

• Key Generation

• Key Encryption

• Key Distribution

• Key Backup

12. Which of the following ways can be used to generate SSL certificates?

Answers:

• Self-generated

• Central SSL Certificate Authority

• SSL Authority

• Certificate Authority

13. Which of the following are IPSec modes?

Answers:

• Hybrid Mode

• Virtual Mode

• Tunnel Mode

• Transport Mode

14. Which of the following protocols can be encapsulated with GRE?

Answers:

• AppleTalk

• IP

• IPX

• DECnet

15. Which of the following are the components of a general MPLS VPN structure?

Answers:

• Customer Edge Router

• Provider Edge Router

• Service Provider

• Customer

• Provider Router

16. Which of the following are the best practices for VPN security?

Answers:

• Running virus scans on VPN servers and clients

• Reviewing the logs

• Disabling the account of the employee who leaves the organisation

• Scanning the VPN server for vulnerablities

• Using IDS

17. Which of the following are the most common VPN problems?

Answers:

• Inablity to connect VPN server

• Inablity to connect hosts beyond VPN server

• Inablity to browse the LAN after log in

• Internet Connectivity

18. Which of the following are components of L2TP Transactions?

Answers:

• Network Access Server

• L2TP access concentrator

• L2TP Network Client

• L2TP Network Server

19. Which of the following can be  threats in an MPLS VPN?

Answers:

• Intrusions from the internet

• Intrusions from an attached VPN

• DoS attack

• Internal threats

20. Which of the following are PPTP vulnerabilities?

Answers:

• Cleartext passwords

• Key Management

• GRE Encapsulation

• Encryption

21. Which of the following are the best practices to choose a VPN service provider?

Answers:

• It should offer strong encryption mechanism

• It should support for Layer 2 & Layer 3 tunneling protocols

• It should offer system level security

• It should have strong network backbone

22. Which of the following measures are taken by IPSec VPN to combat man-in-the-middle attack?

Answers:

• Device authentication

• Using a firewall

• Integrity checking

• Encryption

23. Which of the following are the IPSec security protocols?

Answers:

• Encapsulating Security Payload

• Encapsulating Security Protocol

• Authentication Header

• Authorization Header

24. Which of the following are advantages of MPLS VPN?

Answers:

• It supports various topologies

• It is scalable and flexible

• It offers encryption

• It is easy to implement and configure

25. Which of the following features should be evaluated in a VPN solution?

Answers:

• Connectivity

• Protection

• Authentication

• Application Compatibility

• Management

26. Which of the following are advantages of DES and 3DES?

Answers:

• They use symmetric keys

• They use asymmetric keys

• They make encryption faster

• They make encryption slow

27. Which of the following protocols can use authentication protocols such as RADIUS and TACACS+?

Answers:

• PPTP

• L2TP

• L2F

• LT2P

28. Which of the following are functions of the keys?

Answers:

• Repudiation

• Encryption

• Integrity

• Authentication

29. Which of the following are the authentication methods used in IPSec?

Answers:

• Hashing algorithm

• Pre-shared keys

• Digital Certificates

• Digital Signatures

30. Which of the following sources can be used for testing interoperability between VPN vendors?

Answers:

• VPNC

• IPSec-WIT

• CERT

• ICSA Labs

31. Which of the following protocols are supported by VPDN?

Answers:

• PPTP

• PTPP

• L2TP

• L2F

• LF2

32. Which of the following are types of VPN attacks?

Answers:

• DoS attack

• Attack against VPN protocols

• Cryptanalysis attacks

• Security threats to VPN elements

33. Which of the following are feartures of the IPSec Technology?

Answers:

• Confidentiality

• Availability

• Integrity

• Anti-replay

34. Which of the following are widely used account databases?

Answers:

• Primary Domain Controller

• RADIUS server

• TACACS server

• LDAP

• Novell Directory Service

35. Which of the following are the features of an MPLS VPN?

Answers:

• It is connection-less

• It is encrypting

• It is non-encrypting

• It is scalable

36. Which of the following are the Layer 3 VPNs?

Answers:

• MPLS

• PPTP

• ATM

• IPSec

37. Which of the following measures should be taken to make a DoS resistant network

Answers:

• Correct Device Positioning

• Correct Bandwidth Planning

• Service Overprovisioning

• Anti-DoS solutions

38. Which port is used by L2TP?

Answers:

• 1701

• 1702

• 550

• 4500

39. Which of the following protocols is used for key management?

Answers:

• IKE

• L2TP

• PPTP

• IPSec

40. Which of the following statements is true of  the Transport mode in IPSec?

Answers:

• IPSec header is inserted between IP and Lower layer header

• IPSec header is inserted between IP and Upper layer header

• There is no IPSec header

• Only Authentication header is inserted

• Only Encapsulating Security Payload is inserted

41. To which of the following attacks is IPSec vulnerable to?

Answers:

• Spoofing

• DoS attack

• Brute Force attack

• Key Management attack

42. Which of the following authorities issues Digital Certificates?

Answers:

• Digital Certificate Authority

• Certificate Authority

• Central Certificate Authority

• Central Certificate Team

43. Which of the following symmetric algorithms has variable key length?

Answers:

• MD5

• Triple DES

• DES

• Rivest Cipher 4

44. Which of the following services should be disabled on an MPLS VPN router?

Answers:

• Finger

• TCP keepalives

• NTP

• Password encryption service

• CDP

45. Which of the following is a Hashing algorithm?

Answers:

• Diffie-Hellman

• 3-DES

• DES

• MD5

46. Which of the following ports is used by SSL?

Answers:

• 80

• 443

• 550

• 4500

47. Which of the following port is used by L2F?

Answers:

• UDP 1702

• UDP 1701

• TCP 1702

• TCP 1701

48. How does IPSec handle the confidentiality of a message?

Answers:

• Through encryption

• Through authentication

• Through hashing

• Through sequence numbers

49. The act of learning information about the target network is called?

Answers:

• DoS attack

• Encryption

• Repudiation

• Network reconnaissance

50. What is MPLS network?

Answers:

• Multi Protocol Layer Switching

• Multi Protocol Label Switching

• Multi Protocol Link Switching

• Multi Protocol Label System

• Multi Protocol Layer System

51. The ability of a SSL VPN to receive user requests and relay them to internal server is_________.

Answers:

• Relaying

• Reverse Relaying

• Reverse Proxying

• Forwarding

52. Which of the following is an Asymmetric algorithm?

Answers:

• MD5

• El Gamal

• IDEA

• SHA-1

53. VPDN is a/an

Answers:

• Application Layer VPN

• Session Layer VPN

• Transport Layer VPN

• Network Layer VPN

54. Which port is used by IKE(Internet Key Exchange) ?

Answers:

• TCP 550

• TCP 500

• UDP 550

• UDP 500

55. How many modes are there in IKE Phase 1?

Answers:

• 1

• 2

• 3

• 4

• 5

56. How many keys are required if two parties communicate using Symmetric Cryptography?

Answers:

• One

• Two

• Three

• Four

57. How many tunnels are supported by PPTP?

Answers:

• 1

• 2

• 3

• 4

• 5

58. Which of the following attacks is resembled by the following statement: "Inserting the packets of same sequence number into the data stream between a source and destination computer"?

Answers:

• DNS poisioning

• Landc attack

• Smurf attack

• Replay attack

59. How many phases are there in IKE (Internet Key Exchange)?

Answers:

• 1

• 2

• 3

• 4

• 5

60. Which protocol is used by L2TP?

Answers:

• TCP

• UDP

• RPC

• FTP

61. Which of the following tasks can be performed by GRE?

Answers:

• Encryption

• Authentication

• Integrity Check

• Encapsulation

62. Which port is used for NAT-Traversal?

Answers:

• TCP 4500

• TCP 4600

• UDP 4500

• UDP 4600

63. Which of the following protocols supports IKE?

Answers:

• L2TP

• PPTP

• PTPP

• IPSec

64. To which of the following attacks is Diffie-Hellman algorithm vulnerable?

Answers:

• Brute Force attack

• Dictionary attacks

• Spoofing attack

• Man-in-the-middle attack

65. How does anti-replay mechanism work in IPSec Technology?

Answers:

• By Encryption

• By Hashing

• By Tracking Sequence Numbers

• By Authenitcation

66. Which of the following protocols is used by PPTP to tunnel packets?

Answers:

• L2TP

• L2F

• PPP

• PTPP

67. What is CRL?

Answers:

• Certificate Return List

• Certificate Revised List

• Certificate Revocation List

• Certificate Registration List

68. Which of the following is stored by MPLS in the routing table?

Answers:

• IP address

• ARP

• Labels

• MAC address

69. Which of the following is a characteristic of MPLS VPN?

Answers:

• It can be connection-less

• It can be connection -oriented

• It can be connection -less or connection oriented

• It can be both connection -less and connection-oriented

70. What is VPDN?:

Answers:

• Virtual Private Dial-up Network

• Virtual Private Digital Network

• Virtual Personal Dial-up Network

• Virtual Personal Digital Network

71. How can you overcome the limitation of IPSec to support broadcast and multicast?

Answers:

• Through Multicast Encryption

• Through Broadcast Encryption

• It cannot support them

• Through GRE Encapsulation

72. By which of the following can Man-in-the-middle attack be prevented?

Answers:

• IKE

• Digital Signatures

• Cryptography

• Anti-virus

73. At which layer do SSL VPNs work in the OSI model?

Answers:

• At the Application Layer

• At the Presentation Layer

• At the Session Layer

• At the Transport Layer

• At the Network Layer

74. Which protocol is used by PPTP?

Answers:

• TCP

• UDP

• RPC

• FTP

75. Which port is used by PPTP?

Answers:

• 500

• 550

• 1723


3 NOT Answered Yet Test Questions:

(hold on, will be updated soon)
76. Which of the following VPN protocols is resistant to Denial-of-Service attack?

Answers:

• PPTP

• L2TP

• IPSec

• L2F

77. How many key combinations are possible if the length of the key is 56 bits?

Answers:

• 255

• 2128

• 2256

• 2512

78. Which of the following VPN protocols support multiple tunnels?

Answers:

• PPTP

• L2TP

• IPSec

• NTP