cyber security and element set 20

Que.Site-to-site VPNs are also known as ________
a. Switch-to-switch VPNs
b. Peer-to-Peer VPNs
c. Point-to-point VPNs
d. Router-to-router VPNs
Que._________ type of VPNs are used for home private and secure connectivity.
a. Remote access VPNs
b. Site-to-site VPNs
c. Peer-to-Peer VPNs
d. Router-to-router VPNs
Que.Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
a. Remote access VPNs
b. Site-to-site VPNs
c. Peer-to-Peer VPNs
d. Country-to-country VPNs
Que.Site-to-Site VPN architecture is also known as _________
a. Remote connection based VPNs
b. Peer-to-Peer VPNs
c. Extranet based VPN
d. Country-to-country VPNs
Que.There are ________ types of VPN protocols.
a. 3
b. 4
c. 5
d. 6
Que.For secure connection, Remote access VPNs rely on ___________ and ____________
a. IPSec, SSL
b. L2TP, SSL
c. IPSec, SSH
d. SSH, SSL
Que.A ______ can hide a user’s browsing activity.
a. Firewall
b. Antivirus
c. Incognito mode
d. VPN
Que.__________ masks your IP address.
a. Firewall
b. Antivirus
c. VPN
d. Incognito mode
Que._________ are also used for hides user’s physical location.
a. Firewall
b. Antivirus
c. Incognito mode
d. VPN
Que.Using VPN, we can access _______________
a. Access sites that are blocked geographically
b. Compromise other’s system remotely
c. Hide our personal data in the cloud
d. Encrypts our local drive files while transferring

Get code60