Upwork VIRTUAL PRIVATE NETWORK TEST 2016

Hello Freelancer, Welcome to allupworktestanswers.com Here to get the VIRTUAL PRIVATE NETWORK TEST of Latest version 2016. We are ready here to provide your desire upwork test answer. We already tested all exam test information Available include on here. So Dear, Why Late? Read the below full exam test and get more information from our website.



1. Due to which of the following reasons do you need to revoke a certificate?
Answers:
  1. The private key used for authentication has been compromised
  2. The identity certificate has been compromised
  3. The certificate is no longer used
  4. The certificate has expired
2. Which of the following are the types of VPN?
Answers:
  1. GRE
  2. L2TP
  3. PPTP
  4. IPSec
  5. MPLS
3. Which of the following statements are true of IPSec?
Answers:
  1. It can encrypt/decrypt IP traffic only
  2. It can be used for authentication
  3. It can be used for Layer 2 VPN protocol
  4. It does not support multicast or broadcast
  5. It supports only multicast
4. Which of the following are advantages of an SSL VPN?
Answers:
  1. No additional software is required at the client’s side
  2. Secure application access is possible from anywhere
  3. A large number of Web browsers are supported
  4. Several methods of authentication are supported
5. Which of the following are categories of QoS?
Answers:
  1. Hybrid QoS
  2. Integrated services
  3. Best effort QoS
  4. Differentiated services
6. Which of the following are the components of the VPN?
Answers:
  1. Authentication
  2. Encapsulation Method
  3. Data Encryption
  4. Packet Integrity
  5. Key Management
7. Which of the following key lengths are supported by AES?
Answers:
  1. 128
  2. 192
  3. 256
  4. 512
  5. 1024
8. Which of the following are the security concerns while using PPTP?
Answers:
  1. Session Hijacking
  2. Data Manipulation
  3. No Header Information Protection
  4. Weak Encryption
9. Which of the following protocols are supported by PPTP?
Answers:
  1. TCP/IP
  2. AppleTalk
  3. IPX
  4. NetBEUI
10. Which of the following topologies are possible in an IPSec VPN?
Answers:
  1. Hub and Spoke Topology
  2. Bus Topology
  3. Full Mesh Topology
  4. Ring Topology
11. Which of the following are the most important issues in key management?
Answers:
  1. Key Generation
  2. Key Encryption
  3. Key Distribution
  4. Key Backup
12. Which of the following ways can be used to generate SSL certificates?
Answers:
  1. Self-generated
  2. Central SSL Certificate Authority
  3. SSL Authority
  4. Certificate Authority
13. Which of the following are IPSec modes?
Answers:
  1. Hybrid Mode
  2. Virtual Mode
  3. Tunnel Mode
  4. Transport Mode
14. Which of the following protocols can be encapsulated with GRE?
Answers:
  1. AppleTalk
  2. IP
  3. IPX
  4. DECnet
15. Which of the following are the components of a general MPLS VPN structure?
Answers:
  1. Customer Edge Router
  2. Provider Edge Router
  3. Service Provider
  4. Customer
  5. Provider Router
16. Which of the following are the best practices for VPN security?
Answers:
  1. Running virus scans on VPN servers and clients
  2. Reviewing the logs
  3. Disabling the account of the employee who leaves the organisation
  4. Scanning the VPN server for vulnerablities
  5. Using IDS
17. Which of the following are the most common VPN problems?
Answers:
  1. Inablity to connect VPN server
  2. Inablity to connect hosts beyond VPN server
  3. Inablity to browse the LAN after log in
  4. Internet Connectivity
18. Which of the following are components of L2TP Transactions?
Answers:
  1. Network Access Server
  2. L2TP access concentrator
  3. L2TP Network Client
  4. L2TP Network Server
19. Which of the following can be threats in an MPLS VPN?
Answers:
  1. Intrusions from the internet
  2. Intrusions from an attached VPN
  3. DoS attack
  4. Internal threats
20. Which of the following are PPTP vulnerabilities?
Answers:
  1. Cleartext passwords
  2. Key Management
  3. GRE Encapsulation
  4. Encryption
21. Which of the following are the best practices to choose a VPN service provider?
Answers:
  1. It should offer strong encryption mechanism
  2. It should support for Layer 2 & Layer 3 tunneling protocols
  3. It should offer system level security
  4. It should have strong network backbone
22. Which of the following measures are taken by IPSec VPN to combat man-in-the-middle attack?
Answers:
  1. Device authentication
  2. Using a firewall
  3. Integrity checking
  4. Encryption
23. Which of the following are the IPSec security protocols?
Answers:
  1. Encapsulating Security Payload
  2. Encapsulating Security Protocol
  3. Authentication Header
  4. Authorization Header
24. Which of the following are advantages of MPLS VPN?
Answers:
  1. It supports various topologies
  2. It is scalable and flexible
  3. It offers encryption
  4. It is easy to implement and configure
25. Which of the following features should be evaluated in a VPN solution?
Answers:
  1. Connectivity
  2. Protection
  3. Authentication
  4. Application Compatibility
  5. Management
26. Which of the following are advantages of DES and 3DES?
Answers:
  1. They use symmetric keys
  2. They use asymmetric keys
  3. They make encryption faster
  4. They make encryption slow
27. Which of the following protocols can use authentication protocols such as RADIUS and TACACS+?
Answers:
  1. PPTP
  2. L2TP
  3. L2F
  4. LT2P
28. Which of the following are functions of the keys?
Answers:
  1. Repudiation
  2. Encryption
  3. Integrity
  4. Authentication
29. Which of the following are the authentication methods used in IPSec?
Answers:
  1. Hashing algorithm
  2. Pre-shared keys
  3. Digital Certificates
  4. Digital Signatures
30. Which of the following sources can be used for testing interoperability between VPN vendors?
Answers:
  1. VPNC
  2. IPSec-WIT
  3. CERT
  4. ICSA Labs
31. Which of the following protocols are supported by VPDN?
Answers:
  1. PPTP
  2. PTPP
  3. L2TP
  4. L2F
  5. LF2
32. Which of the following are types of VPN attacks?
Answers:
  1. DoS attack
  2. Attack against VPN protocols
  3. Cryptanalysis attacks
  4. Security threats to VPN elements
33. Which of the following are feartures of the IPSec Technology?
Answers:
  1. Confidentiality
  2. Availability
  3. Integrity
  4. Anti-replay
34. Which of the following are widely used account databases?
Answers:
  1. Primary Domain Controller
  2. RADIUS server
  3. TACACS server
  4. LDAP
  5. Novell Directory Service
35. Which of the following are the features of an MPLS VPN?
Answers:
  1. It is connection-less
  2. It is encrypting
  3. It is non-encrypting
  4. It is scalable
36. Which of the following are the Layer 3 VPNs?
Answers:
  1. MPLS
  2. PPTP
  3. ATM
  4. IPSec
37. Which of the following measures should be taken to make a DoS resistant network
Answers:
  1. Correct Device Positioning
  2. Correct Bandwidth Planning
  3. Service Overprovisioning
  4. Anti-DoS solutions
38. Which port is used by L2TP?
Answers:
  1. 1701
  2. 1702
  3. 550
  4. 4500
39. Which of the following protocols is used for key management?
Answers:
  1. IKE
  2. L2TP
  3. PPTP
  4. IPSec
40. Which of the following statements is true of the Transport mode in IPSec?
Answers:
  1. IPSec header is inserted between IP and Lower layer header
  2. IPSec header is inserted between IP and Upper layer header
  3. There is no IPSec header
  4. Only Authentication header is inserted
  5. Only Encapsulating Security Payload is inserted
41. To which of the following attacks is IPSec vulnerable to?
Answers:
  1. Spoofing
  2. DoS attack
  3. Brute Force attack
  4. Key Management attack
42. Which of the following authorities issues Digital Certificates?
Answers:
  1. Digital Certificate Authority
  2. Certificate Authority
  3. Central Certificate Authority
  4. Central Certificate Team
43. Which of the following symmetric algorithms has variable key length?
Answers:
  1. MD5
  2. Triple DES
  3. DES
  4. Rivest Cipher 4
44. Which of the following services should be disabled on an MPLS VPN router?
Answers:
  1. Finger
  2. TCP keepalives
  3. NTP
  4. Password encryption service
  5. CDP
45. Which of the following is a Hashing algorithm?
Answers:
  1. Diffie-Hellman
  2. 3-DES
  3. DES
  4. MD5
46. Which of the following ports is used by SSL?
Answers:
  1. 80
  2. 443
  3. 550
  4. 4500
47. Which of the following port is used by L2F?
Answers:
  1. UDP 1702
  2. UDP 1701
  3. TCP 1702
  4. TCP 1701
48. How does IPSec handle the confidentiality of a message?
Answers:
  1. Through encryption
  2. Through authentication
  3. Through hashing
  4. Through sequence numbers
49. The act of learning information about the target network is called?
Answers:
  1. DoS attack
  2. Encryption
  3. Repudiation
  4. Network reconnaissance
50. What is MPLS network?
Answers:
  1. Multi Protocol Layer Switching
  2. Multi Protocol Label Switching
  3. Multi Protocol Link Switching
  4. Multi Protocol Label System
  5. Multi Protocol Layer System
51. The ability of a SSL VPN to receive user requests and relay them to internal server is_________.
Answers:
  1. Relaying
  2. Reverse Relaying
  3. Reverse Proxying
  4. Forwarding
52. Which of the following is an Asymmetric algorithm?
Answers:
  1. MD5
  2. El Gamal
  3. IDEA
  4. SHA-1
53. VPDN is a/an
Answers:
  1. Application Layer VPN
  2. Session Layer VPN
  3. Transport Layer VPN
  4. Network Layer VPN
54. Which port is used by IKE(Internet Key Exchange) ?
Answers:
  1. TCP 550
  2. TCP 500
  3. UDP 550
  4. UDP 500
55. How many modes are there in IKE Phase 1?
Answers:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
56. How many keys are required if two parties communicate using Symmetric Cryptography?
Answers:
  1. One
  2. Two
  3. Three
  4. Four
57. How many tunnels are supported by PPTP?
Answers:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
58. Which of the following attacks is resembled by the following statement: “Inserting the packets of same sequence number into the data stream between a source and destination computer”?
Answers:
  1. DNS poisioning
  2. Landc attack
  3. Smurf attack
  4. Replay attack
59. How many phases are there in IKE (Internet Key Exchange)?
Answers:
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
60. Which protocol is used by L2TP?
Answers:
  1. TCP
  2. UDP
  3. RPC
  4. FTP
61. Which of the following tasks can be performed by GRE?
Answers:
  1. Encryption
  2. Authentication
  3. Integrity Check
  4. Encapsulation
62. Which port is used for NAT-Traversal?
Answers:
  1. TCP 4500
  2. TCP 4600
  3. UDP 4500
  4. UDP 4600
63. Which of the following protocols supports IKE?
Answers:
  1. L2TP
  2. PPTP
  3. PTPP
  4. IPSec
64. To which of the following attacks is Diffie-Hellman algorithm vulnerable?
Answers:
  1. Brute Force attack
  2. Dictionary attacks
  3. Spoofing attack
  4. Man-in-the-middle attack
65. How does anti-replay mechanism work in IPSec Technology?
Answers:
  1. By Encryption
  2. By Hashing
  3. By Tracking Sequence Numbers
  4. By Authenitcation
66. Which of the following protocols is used by PPTP to tunnel packets?
Answers:
  1. L2TP
  2. L2F
  3. PPP
  4. PTPP
67. What is CRL?
Answers:
  1. Certificate Return List
  2. Certificate Revised List
  3. Certificate Revocation List
  4. Certificate Registration List
68. Which of the following is stored by MPLS in the routing table?
Answers:
  1. IP address
  2. ARP
  3. Labels
  4. MAC address
69. Which of the following is a characteristic of MPLS VPN?
Answers:
  1. It can be connection-less
  2. It can be connection -oriented
  3. It can be connection -less or connection oriented
  4. It can be both connection -less and connection-oriented
70. What is VPDN?:
Answers:
  1. Virtual Private Dial-up Network
  2. Virtual Private Digital Network
  3. Virtual Personal Dial-up Network
  4. Virtual Personal Digital Network
71. How can you overcome the limitation of IPSec to support broadcast and multicast?
Answers:
  1. Through Multicast Encryption
  2. Through Broadcast Encryption
  3. It cannot support them
  4. Through GRE Encapsulation
72. By which of the following can Man-in-the-middle attack be prevented?
Answers:
  1. IKE
  2. Digital Signatures
  3. Cryptography
  4. Anti-virus
73. At which layer do SSL VPNs work in the OSI model?
Answers:
  1. At the Application Layer
  2. At the Presentation Layer
  3. At the Session Layer
  4. At the Transport Layer
  5. At the Network Layer
74. Which protocol is used by PPTP?
Answers:
  1. TCP
  2. UDP
  3. RPC
  4. FTP
75. Which port is used by PPTP?
Answers:
  1. 500
  2. 550
  3. 1723

Finally no more words require about the VIRTUAL PRIVATE NETWORK TEST  information in this session of this content. If you are require knowing more, Please ask to us via our contact us form or comment box. Please make sure that, you don’t send Personal information via the Comment box.  Thank you very mutch for being with us.

0 comments: