VPN
₹413.70
VPN Interview Q & A Vol 1.0
Description
VPN Interview Q & A Vol 1.0
Questions 100
Check the complete list of questions:
- What is VPN?
- What Security Vulnerabilities Are Addressed By VPN?
- What is Authentication, Confidentiality & Integrity?
- Can You List Some Items For A VPN Checklist From Deciding Whether To Use, Then Selecting, Then Deploying, then Maintaining VPN?
- What is Symmetric and Asymmetric Encryption?
- Which UDP ports should be open on a firewall to allow traffic from a L2TP/IPSEC based VPN clients to a PPTP VPN server on the inside?
- What is IPsec VPN?
- Is VPN A Long-term Solution Or A Short-term Stop Gap Kind Of Thing?
- At what layer IPsec works?
- What is name of cisco VPN Client installed on end devices?
- What Are Unreasonable Expectations For VPN?
- Does Cisco 4000 Series Router IOS support SSL VPN?
- Name a major drawback of IPSec?
- What is difference between GETVPN and FlexVPN?
- What is the difference between Transport and Tunnel mode?
- What are the three main security services that IPSec VPN provides?
- Define Digital Signatures?
- What Are Reasonable Expectations For A VPN?
- What is Authorization?
- Is There Market Penetration For These Products?
- What Firewall Issues Are Relevant To VPN Selection And Deployment?
- What is Site to Site and Remote Access VPN?
- What are the 3 protocols used in IPSec?
- Explain IPsec Protocol Headers?
- How ESP & AH provides anti-replay protection?
- What is IKE?
- What Kind Of Resources (staff, Computational Muscle, Bandwidth, etc) Are Required for VPN Deployment, Usage, Maintenance?
- At what protocol does IKE works?
- Explain how IKE/ISAKMP Works?
- Explain the messages exchange between the peers in IKE/ISAKMP?
- What Is The Relationship Between VPN And Firewalls?
- What is Diffie-Hellman?
- How Diffie-Hellman works?
- What are Security Associations?
- What is Transform set?
- What are Crypto access lists?
- Are There Applications or Environments in Which VPNs Would Really Be Detrimental?
- In a SSL VPN architecture, where are the session keys stored.
- What are Crypto map?
- What is SSL/TLS?
- What is Split Tunneling? Why is it required?
- How do you check the status of the tunnel’s phase 1 & 2?
- What is IPsec Virtual Tunnel Interface?
- What is L2F?
- Are VPNs Used For Specific Kinds Of Applications Or Environments? If So, What Are Some Examples Of Where And Why VPNs Would Be Deployed?
- What are the main components of VPN?
- What is CBC ?
- What is the difference between Static Crypto Maps and Dynamic Crypto Maps?
- What is Cisco Easy VPN?
- What are the 3 key methods to Control the access of VPN users and allowing access to selective resources?
- What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation?
- What is the meaning of DAP wrt VPN ?
- What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation?
- What is DMVPN?
- What Crypto Issues Are Relevant In The VPN Context?
- What is GRE in PPTP?
- How does PPTP encapsulate data?
- Can you explain CHAP?
- Can you explain PAP?
- what does PPTP use for encryption and authentication?
- What are the three phases of DMVPN?
- Explain Next Hop Resolution Protocol (NHRP)?
- What is GRE?
- Name a major drawback of both GRE & L2TP?
- Who Are The Major Players In The Market?
- What is SSL VPN?
- How is SSL VPN different from IPsec VPN?
- What are the different types of VPN?
- At which Layer does SSL VPN operates?
- By default, how many message pairs are exchanged in a typical IKEv2 connection?
- What are different SSL VPN Modes?
- What Are Some Of The Tough Questions To Pose To VPN Product Vendors?
- Which method enables you to prevent user web traffic from traveling through the VPN tunnel?
- Explain SSL Handshake?
- what is the concept of HA and FA in VPN tunneling?
- What is a connection profile?What details need to be entered which creating a connection profile?
- What is significance of “priority” keyword in following command – “crypto dynamic-map name priority set ikev2 ipsec-proposal proposals“
- What Kind Of Performance Issues Does VPN Raise?
- What Security Vulnerabilities Are Unique To Or Heightened By VPN?
- What are the available VPN Client IP Address Allocation methods is ASA?
- An AnyConnect client uses which protocol through a VPN tunnel for automatic Certificate retrieval?
- Which ports on firewall should be allowed for IPSEC Site to Site VPN?
- Which ACL type is used with split-tunneling configuration?
- What are 3 major components of Easy VPN?
- During which phase does peer authentication occur?
- What is difference between IKEv1 and IKEv2?
- A user is complaining of being unable to open external or internal URLs directly or from the bookmark list. What could be the problem?
- In a Cisco Remote-Access VPN Client , which files hold connection entry information?
- What is the default MTU size set during installation of IPsec VPN Client on windows PC?
- What is difference between MPLS and VPN?
- What is difference between VPN and proxy?
- Does Cisco ASA support VPN is Multi-context mode? If yes, then which Release onwards is the feature supported?
- There is requirement to setup a VPN box in Data Center with different security Zones. Which Security Zone should the Internet/Public facing VPN box be connected to be reachable for Internet based users?
- What is NAT Traversal? What is the purpose of using NAT-T?
- Which IP protocol does AH and ESP headers use in IPSEC ?
- Which type of VPN would you use if data has to be encrypted at the network layer?
- What do we mean by VPN hairpinning?
- What output after issuing “show crypto isakmp sa” command shows state as “MM_KEY_EXCH”, is this ideal state of VPN?
- Which command is used to view the IKE Phase 1 management connections?
- Which ports on firewall should be allowed for IPSEC Site to Site VPN?
Reviews
There are no reviews yet.