4To5Jack’s VPN Quiz Helper Below you can find our answers to the most common quiz questions around VPN’s: Which process is used to protect transmitted data in a VPN? Symmetric key encryption and public-key encryption What dedicated hardware device aggregates hundreds or thousands of VPN connections? A VPN concentrator What does a VPN use to ensure that any transmissions that are intercepted will be indecipherable? Tunneling protocols allowing for two-way data traffic encryption When employees have multiple concurrent connections, what might be happening to the VPN system? A VPN system may be dealing with a network overload Before IPSec can be used as a virtual private network (VPN) service, what must be created? A secure client-server connection based on a trusted certificate Which VPN protocol uses UDP port 1701 and does not provide confidentiality and authentication? Layer Two Tunneling Protocol (L2TP) Which VPN protocol works at Layer 3 and can encrypt the entire TCP/IP packet? The IP security (IPSec) Which VPN topology is also known as a hub-and-spoke configuration? A centralized VPN structure which uses a single tunnel to reroute traffic Which VPN tunneling protocol uses IPSec with 3DES for data confidentiality? ESP, short for “Encapsulating/Encapsulated Security Payload.” What UDP port is used for IKE traffic from a VPN client to server? Protocol port 500, 4500, or both Which VPN protocol leverages web-based applications? Secure Sockets Layer (SSL) For domain-joined computers, what is the simplest way to configure VPN connections? Group Policy Preferences How does a virtual private network (VPN) provide additional security over other types of networks? A VPN will both handle all of your system traffic by encrypting it, and then anonymize it with a fake IP address