Below you can find our answers to the most common quiz questions around VPN’s:

Which process is used to protect transmitted data in a VPN?

Symmetric key encryption and public-key encryption

What dedicated hardware device aggregates hundreds or thousands of VPN connections?

A VPN concentrator

What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable?

Tunneling protocols allowing for two-way data traffic encryption

When employees have multiple concurrent connections, what might be happening to the VPN system?

A VPN system may be dealing with a network overload

Before IPSec can be used as a virtual private network (VPN) service, what must be created?

A secure client-server connection based on a trusted certificate

Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication?

Layer Two Tunneling Protocol (L2TP)

Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet?

The IP security (IPSec)

Which VPN topology is also known as a hub-and-spoke configuration?

A centralized VPN structure which uses a single tunnel to reroute traffic

Which VPN tunneling protocol uses IPSec with 3DES for data confidentiality?

ESP, short for “Encapsulating/Encapsulated Security Payload.”

What UDP port is used for IKE traffic from a VPN client to server?

Protocol port 500, 4500, or both

Which VPN protocol leverages web-based applications?

Secure Sockets Layer (SSL)

For domain-joined computers, what is the simplest way to configure VPN connections?

Group Policy Preferences

How does a virtual private network (VPN) provide additional security over other types of networks?

A VPN will both handle all of your system traffic by encrypting it, and then anonymize it with a fake IP address