

MCQOPTIONS
Saved Bookmarks
This section includes 19 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
_________ are also used for hides user’s physical location. |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
2. |
A ______ can hide a user’s browsing activity. |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
3. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
A. | IPSec, SSL |
B. | L2TP, SSL |
C. | IPSec, SSH |
D. | SSH, SSL |
Answer» B. L2TP, SSL | |
4. |
WHICH_TYPES_OF_VPNS_ARE_USED_FOR_CORPORATE_CONNECTIVITY_ACROSS_COMPANIES_RESIDING_IN_DIFFERENT_GEOGRAPHICAL_LOCATION??$ |
A. | Remote access VPNs |
B. | Site-to-site VPNs |
C. | Peer-to-Peer VPNs |
D. | Country-to-country VPNs |
Answer» C. Peer-to-Peer VPNs | |
5. |
There are ________ types of VPN protocols.$ |
A. | 3 |
B. | 4 |
C. | 5 |
D. | 6 |
Answer» E. | |
6. |
Site-to-Site VPN architecture is also known as _________$ |
A. | Remote connection based VPNs |
B. | Peer-to-Peer VPNs |
C. | Extranet based VPN |
D. | Country-to-country VPNs |
Answer» D. Country-to-country VPNs | |
7. |
Using VPN, we can access _______________ |
A. | Access sites that are blocked geographically |
B. | Compromise other’s system remotely |
C. | Hide our personal data in the cloud |
D. | Encrypts our local drive files while transferring |
Answer» B. Compromise other‚Äö√Ñ√∂‚àö√ë‚àö¬•s system remotely | |
8. |
_________ are also used for hides user’s physical location.$ |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
9. |
__________ masks your IP address. |
A. | Firewall |
B. | Antivirus |
C. | VPN |
D. | Incognito mode |
Answer» D. Incognito mode | |
10. |
A ______ can hide a user’s browsing activity.$ |
A. | Firewall |
B. | Antivirus |
C. | Incognito mode |
D. | VPN |
Answer» E. | |
11. |
For secure connection, Remote access VPNs rely on ___________ and ____________ |
A. | IPSec, SSL |
B. | L2TP, SSL |
C. | IPSec, SSH |
D. | SSH, SSL |
Answer» B. L2TP, SSL | |
12. |
_________ type of VPNs are used for home private and secure connectivity? |
A. | Remote access VPNs |
B. | Site-to-site VPNs |
C. | Peer-to-Peer VPNs |
D. | Router-to-router VPNs |
Answer» B. Site-to-site VPNs | |
13. |
Site-to-site VPNs are also known as ________ |
A. | Switch-to-switch VPNs |
B. | Peer-to-Peer VPNs |
C. | Point-to-point VPNs |
D. | Router-to-router VPNs |
Answer» E. | |
14. |
There are _________ types of VPNs. |
A. | 3 |
B. | 2 |
C. | 5 |
D. | 4 |
Answer» C. 5 | |
15. |
VPNs uses encryption techniques to maintain security and privacy which communicating remotely via public network. |
A. | True |
B. | False |
Answer» B. False | |
16. |
What types of protocols are used in VPNs? |
A. | Application level protocols |
B. | Tunnelling protocols |
C. | Network protocols |
D. | Mailing protocols |
Answer» B. Tunnelling protocols | |
17. |
Which of the statements are not true to classify VPN systems? |
A. | Protocols used for tunnelling the traffic |
B. | Whether VPNs are providing site-to-site or remote access connection |
C. | Securing the network from bots and malwares |
D. | Levels of security provided for sending and receiving data privately |
Answer» D. Levels of security provided for sending and receiving data privately | |
18. |
__________ provides an isolated tunnel across a public network for sending and receiving data privately, as if the computing devices were directly connected to the private network. |
A. | Visual Private Network |
B. | Virtual Protocol Network |
C. | Virtual Protocol Networking |
D. | Virtual Private Network |
Answer» E. | |
19. |
VPN is abbreviated as __________ |
A. | Visual Private Network |
B. | Virtual Protocol Network |
C. | Virtual Private Network |
D. | Virtual Protocol Networking |
Answer» D. Virtual Protocol Networking | |