Que.Site-to-site VPNs are also known as ________
|
a. Switch-to-switch VPNs |
b. Peer-to-Peer VPNs |
c. Point-to-point VPNs |
d. Router-to-router VPNs |
Que._________ type of VPNs are used for home private and secure connectivity.
|
a. Remote access VPNs |
b. Site-to-site VPNs |
c. Peer-to-Peer VPNs |
d. Router-to-router VPNs |
Que.Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
|
a. Remote access VPNs |
b. Site-to-site VPNs |
c. Peer-to-Peer VPNs |
d. Country-to-country VPNs |
Que.Site-to-Site VPN architecture is also known as _________
|
a. Remote connection based VPNs |
b. Peer-to-Peer VPNs |
c. Extranet based VPN |
d. Country-to-country VPNs |
Que.There are ________ types of VPN protocols.
|
a. 3 |
b. 4 |
c. 5 |
d. 6 |
Que.For secure connection, Remote access VPNs rely on ___________ and ____________
|
a. IPSec, SSL |
b. L2TP, SSL |
c. IPSec, SSH |
d. SSH, SSL |
Que.A ______ can hide a user’s browsing activity.
|
a. Firewall |
b. Antivirus |
c. Incognito mode |
d. VPN |
Que.__________ masks your IP address.
|
a. Firewall |
b. Antivirus |
c. VPN |
d. Incognito mode |
Que._________ are also used for hides user’s physical location.
|
a. Firewall |
b. Antivirus |
c. Incognito mode |
d. VPN |
Que.Using VPN, we can access _______________
|
a. Access sites that are blocked geographically |
b. Compromise other’s system remotely |
c. Hide our personal data in the cloud |
d. Encrypts our local drive files while transferring |
Access sites that are blocked geographically