Cyber Security Questions and Answers Part-19

1. Which types of VPNs are used for corporate connectivity across companies residing in different geographical location?
a) Remote access VPNs
b) Site-to-site VPNs
c) Peer-to-Peer VPNs
d) Country-to-country VPNs

Answer: b
Explanation: Site-to-site VPNs are also known as Router-to-router VPNs which are typically used in companies and firms for connecting remotely different branches with different geographical locations.

2. Site-to-Site VPN architecture is also known as _________
a) Remote connection based VPNs
b) Peer-to-Peer VPNs
c) Extranet based VPN
d) Country-to-country VPNs

Answer: c
Explanation: Site-to-site VPN architecture is also known as extranet based VPNs because these type of VPNs are typically used to connect firms externally between different branches of the same company.

3. There are ________ types of VPN protocols.
a) 3
b) 4
c) 5
d) 6

Answer: d
Explanation: There are six types of protocols used in VPN. These are Internet Protocol Security or IPSec, Layer 2 Tunnelling Protocol (L2TP), Point – to – Point Tunnelling Protocol (PPTP), Secure Sockets Layer (SSL), OpenVPN and Secure Shell (SSH).

4. For secure connection, Remote access VPNs rely on ___________ and ____________
a) IPSec, SSL
b) L2TP, SSL
c) IPSec, SSH
d) SSH, SSL

Answer: a
Explanation: A remote-access VPN typically depends on either Secure Sockets Layer (SSL) or IP Security (IPsec) for a secure connection over public network.

5. A ______ can hide a user’s browsing activity.
a) Firewall
b) Antivirus
c) Incognito mode
d) VPN

Answer: d
Explanation: VPNs are used for hiding user’s browsing activities and maintain anonymity. This also helps in preventing user’s personal browsing data leakage and protects the leakage of browsing habits.

6. __________ masks your IP address.
a) Firewall
b) Antivirus
c) VPN
d) Incognito mode

Answer: c
Explanation: VPNs are used for masking user’s IP address and maintain anonymity. This protects leakage of IP address that almost every website grabs when a user opens a website.

7. _________ are also used for hides user’s physical location.
a) Firewall
b) Antivirus
c) Incognito mode
d) VPN

Answer: d
Explanation: VPNs are used for hiding your physical location which helps in maintaining anonymity. Using IP address and browsing habits, link search, your physical location can be traced.

8. Using VPN, we can access _______________
a) Access sites that are blocked geographically
b) Compromise other’s system remotely
c) Hide our personal data in the cloud
d) Encrypts our local drive files while transferring

Answer: a
Explanation: With the help of VPN, users can access and connect to sites that are kept blocked by the ISPs based on a specific geographic location.

9. _________ is one of the most secured Linux OS that provides anonymity and an incognito option for securing its user data.
a) Fedora
b) Tails
c) Ubuntu
d) OpenSUSE

Answer: b
Explanation: If any user is looking for Linux based security solutions, Tails is one of the most popular Linux-based operating systems that provides anonymity and an incognito option for securing its user data.

10. Which of the following OS does not comes under a secured Linux OS list?
a) Qubes OS
b) Tails
c) Tin Hat
d) Ubuntu

Answer: d
Explanation: Qubes OS, Tails OS, and Tin Hat are amongst the most secured Linux Operating Systems (OS) that provide fast and secure Linux experience along with maintaining anonymity for the users.