MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
_________ are also used for hides user’s physical location. |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 2. |
A ______ can hide a user’s browsing activity. |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 3. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
| A. | IPSec, SSL |
| B. | L2TP, SSL |
| C. | IPSec, SSH |
| D. | SSH, SSL |
| Answer» B. L2TP, SSL | |
| 4. |
WHICH_TYPES_OF_VPNS_ARE_USED_FOR_CORPORATE_CONNECTIVITY_ACROSS_COMPANIES_RESIDING_IN_DIFFERENT_GEOGRAPHICAL_LOCATION??$ |
| A. | Remote access VPNs |
| B. | Site-to-site VPNs |
| C. | Peer-to-Peer VPNs |
| D. | Country-to-country VPNs |
| Answer» C. Peer-to-Peer VPNs | |
| 5. |
There are ________ types of VPN protocols.$ |
| A. | 3 |
| B. | 4 |
| C. | 5 |
| D. | 6 |
| Answer» E. | |
| 6. |
Site-to-Site VPN architecture is also known as _________$ |
| A. | Remote connection based VPNs |
| B. | Peer-to-Peer VPNs |
| C. | Extranet based VPN |
| D. | Country-to-country VPNs |
| Answer» D. Country-to-country VPNs | |
| 7. |
Using VPN, we can access _______________ |
| A. | Access sites that are blocked geographically |
| B. | Compromise other’s system remotely |
| C. | Hide our personal data in the cloud |
| D. | Encrypts our local drive files while transferring |
| Answer» B. Compromise other‚Äö√Ñ√∂‚àö√ë‚àö¬•s system remotely | |
| 8. |
_________ are also used for hides user’s physical location.$ |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 9. |
__________ masks your IP address. |
| A. | Firewall |
| B. | Antivirus |
| C. | VPN |
| D. | Incognito mode |
| Answer» D. Incognito mode | |
| 10. |
A ______ can hide a user’s browsing activity.$ |
| A. | Firewall |
| B. | Antivirus |
| C. | Incognito mode |
| D. | VPN |
| Answer» E. | |
| 11. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
| A. | IPSec, SSL |
| B. | L2TP, SSL |
| C. | IPSec, SSH |
| D. | SSH, SSL |
| Answer» B. L2TP, SSL | |
| 12. |
_________ type of VPNs are used for home private and secure connectivity? |
| A. | Remote access VPNs |
| B. | Site-to-site VPNs |
| C. | Peer-to-Peer VPNs |
| D. | Router-to-router VPNs |
| Answer» B. Site-to-site VPNs | |
| 13. |
Site-to-site VPNs are also known as ________ |
| A. | Switch-to-switch VPNs |
| B. | Peer-to-Peer VPNs |
| C. | Point-to-point VPNs |
| D. | Router-to-router VPNs |
| Answer» E. | |
| 14. |
There are _________ types of VPNs. |
| A. | 3 |
| B. | 2 |
| C. | 5 |
| D. | 4 |
| Answer» C. 5 | |
| 15. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
| A. | True |
| B. | False |
| Answer» B. False | |
| 16. |
What types of protocols are used in VPNs? |
| A. | Application level protocols |
| B. | Tunnelling protocols |
| C. | Network protocols |
| D. | Mailing protocols |
| Answer» B. Tunnelling protocols | |
| 17. |
Which of the statements are not true to classify VPN systems? |
| A. | Protocols used for tunnelling the traffic |
| B. | Whether VPNs are providing site-to-site or remote access connection |
| C. | Securing the network from bots and malwares |
| D. | Levels of security provided for sending and receiving data privately |
| Answer» D. Levels of security provided for sending and receiving data privately | |
| 18. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately, as if the computing devices were directly connected to the private network. |
| A. | Visual Private Network |
| B. | Virtual Protocol Network |
| C. | Virtual Protocol Networking |
| D. | Virtual Private Network |
| Answer» E. | |
| 19. |
VPN is abbreviated as __________ |
| A. | Visual Private Network |
| B. | Virtual Protocol Network |
| C. | Virtual Private Network |
| D. | Virtual Protocol Networking |
| Answer» D. Virtual Protocol Networking | |