cyber security and element set 20

Que.Site-to-site VPNs are also known as ________
a. Switch-to-switch VPNs
b. Peer-to-Peer VPNs
c. Point-to-point VPNs
d. Router-to-router VPNs
Que._________ type of VPNs are used for home private and secure connectivity.
a. Remote access VPNs
b. Site-to-site VPNs
c. Peer-to-Peer VPNs
d. Router-to-router VPNs
Que.Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
a. Remote access VPNs
b. Site-to-site VPNs
c. Peer-to-Peer VPNs
d. Country-to-country VPNs
Que.Site-to-Site VPN architecture is also known as _________
a. Remote connection based VPNs
b. Peer-to-Peer VPNs
c. Extranet based VPN
d. Country-to-country VPNs
Que.There are ________ types of VPN protocols.
a. 3
b. 4
c. 5
d. 6
Que.For secure connection, Remote access VPNs rely on ___________ and ____________
a. IPSec, SSL
b. L2TP, SSL
c. IPSec, SSH
d. SSH, SSL
Que.A ______ can hide a user’s browsing activity.
a. Firewall
b. Antivirus
c. Incognito mode
d. VPN
Que.__________ masks your IP address.
a. Firewall
b. Antivirus
c. VPN
d. Incognito mode
Que._________ are also used for hides user’s physical location.
a. Firewall
b. Antivirus
c. Incognito mode
d. VPN
Que.Using VPN, we can access _______________
a. Access sites that are blocked geographically
b. Compromise other’s system remotely
c. Hide our personal data in the cloud
d. Encrypts our local drive files while transferring