 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. | _________ are also used for hides user’s physical location. | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Incognito mode | 
| D. | VPN | 
| Answer» E. | |
| 2. | A ______ can hide a user’s browsing activity. | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Incognito mode | 
| D. | VPN | 
| Answer» E. | |
| 3. | For secure connection, Remote access VPNs rely on ___________ and ____________ | 
| A. | IPSec, SSL | 
| B. | L2TP, SSL | 
| C. | IPSec, SSH | 
| D. | SSH, SSL | 
| Answer» B. L2TP, SSL | |
| 4. | WHICH_TYPES_OF_VPNS_ARE_USED_FOR_CORPORATE_CONNECTIVITY_ACROSS_COMPANIES_RESIDING_IN_DIFFERENT_GEOGRAPHICAL_LOCATION??$ | 
| A. | Remote access VPNs | 
| B. | Site-to-site VPNs | 
| C. | Peer-to-Peer VPNs | 
| D. | Country-to-country VPNs | 
| Answer» C. Peer-to-Peer VPNs | |
| 5. | There are ________ types of VPN protocols.$ | 
| A. | 3 | 
| B. | 4 | 
| C. | 5 | 
| D. | 6 | 
| Answer» E. | |
| 6. | Site-to-Site VPN architecture is also known as _________$ | 
| A. | Remote connection based VPNs | 
| B. | Peer-to-Peer VPNs | 
| C. | Extranet based VPN | 
| D. | Country-to-country VPNs | 
| Answer» D. Country-to-country VPNs | |
| 7. | Using VPN, we can access _______________ | 
| A. | Access sites that are blocked geographically | 
| B. | Compromise other’s system remotely | 
| C. | Hide our personal data in the cloud | 
| D. | Encrypts our local drive files while transferring | 
| Answer» B. Compromise other‚Äö√Ñ√∂‚àö√ë‚àö¬•s system remotely | |
| 8. | _________ are also used for hides user’s physical location.$ | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Incognito mode | 
| D. | VPN | 
| Answer» E. | |
| 9. | __________ masks your IP address. | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | VPN | 
| D. | Incognito mode | 
| Answer» D. Incognito mode | |
| 10. | A ______ can hide a user’s browsing activity.$ | 
| A. | Firewall | 
| B. | Antivirus | 
| C. | Incognito mode | 
| D. | VPN | 
| Answer» E. | |
| 11. | For secure connection, Remote access VPNs rely on ___________ and ____________ | 
| A. | IPSec, SSL | 
| B. | L2TP, SSL | 
| C. | IPSec, SSH | 
| D. | SSH, SSL | 
| Answer» B. L2TP, SSL | |
| 12. | _________ type of VPNs are used for home private and secure connectivity? | 
| A. | Remote access VPNs | 
| B. | Site-to-site VPNs | 
| C. | Peer-to-Peer VPNs | 
| D. | Router-to-router VPNs | 
| Answer» B. Site-to-site VPNs | |
| 13. | Site-to-site VPNs are also known as ________ | 
| A. | Switch-to-switch VPNs | 
| B. | Peer-to-Peer VPNs | 
| C. | Point-to-point VPNs | 
| D. | Router-to-router VPNs | 
| Answer» E. | |
| 14. | There are _________ types of VPNs. | 
| A. | 3 | 
| B. | 2 | 
| C. | 5 | 
| D. | 4 | 
| Answer» C. 5 | |
| 15. | VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. | 
| A. | True | 
| B. | False | 
| Answer» B. False | |
| 16. | What types of protocols are used in VPNs? | 
| A. | Application level protocols | 
| B. | Tunnelling protocols | 
| C. | Network protocols | 
| D. | Mailing protocols | 
| Answer» B. Tunnelling protocols | |
| 17. | Which of the statements are not true to classify VPN systems? | 
| A. | Protocols used for tunnelling the traffic | 
| B. | Whether VPNs are providing site-to-site or remote access connection | 
| C. | Securing the network from bots and malwares | 
| D. | Levels of security provided for sending and receiving data privately | 
| Answer» D. Levels of security provided for sending and receiving data privately | |
| 18. | __________ provides an isolated tunnel across a public network for sending and receiving data privately, as if the computing devices were directly connected to the private network. | 
| A. | Visual Private Network | 
| B. | Virtual Protocol Network | 
| C. | Virtual Protocol Networking | 
| D. | Virtual Private Network | 
| Answer» E. | |
| 19. | VPN is abbreviated as __________ | 
| A. | Visual Private Network | 
| B. | Virtual Protocol Network | 
| C. | Virtual Private Network | 
| D. | Virtual Protocol Networking | 
| Answer» D. Virtual Protocol Networking | |