http://www.hub4tech.com/blog/top-vpn-interview-questions-and-answers-you-must-prepare - PowerPoint PPT Presentation

About This Presentation
Title:

http://www.hub4tech.com/blog/top-vpn-interview-questions-and-answers-you-must-prepare

Description:

You are a networking professional and looking to kick starts your high flying career in networking domain. Here is a list of Top VPN interview questions and answers for fresher and experienced - In this blog post, we have covered all about VPN questions and answer that might be asked during your interview. These questions will help you clear you in qualifying your technical interviews. – PowerPoint PPT presentation

Number of Views:2

less

Transcript and Presenter's Notes

Title: http://www.hub4tech.com/blog/top-vpn-interview-questions-and-answers-you-must-prepare


1

Top VPN Interview Questions and Answers You Must
Prepare
  • Hub4Tech

2
Question 1 What is Trusted and Untrusted
Networks?
  • Answer
  • Trusted networks Such Networks allow data to be
    transferred transparently. The machines using a
    trusted network are usually administered by an
    Administrator to ensure that private and secured
    data is not leaked. Access to this network is
    limited. Computers using trusted networks are
    more secured and confidential because of strong
    firewalls.Untrusted networks Such networks are
    usually administered by the owners. They can
    allow improper access to sensitive or personal
    data. These machines are usually separate. Such
    machines could me more prone to attacks.

3
Question 2 Is there market penetration for these
products?
  • Answer
  • Those companies who were early adopters of
    firewalls are the ones using VPNs today. VPNs are
    still early in the use cycle. Three years ago,
    they hardly existed. Then firewall products
    started to include them first ANS Interlock,
    then TIS Gauntlet. Soon, customers started
    demanding VPN functionality in their firewalls,
    even though few of them actually used it. But the
    Security Architecture for Internet Protocol
    (IPSEC) standard is changing that with
    IPSEC-compliant off-the-shelf products, using
    encryption to protect the privacy of
    communications will be an automatic decision. It
    may take awhile. I predicted that 1998 would be
    the "Year of the VPN," but maybe 1999 is more
    realistic. Look, over four years after the famous
    Internet password sniffing incident, most people
    still seem to be working with reusable passwords.

4
Question 3What are the different authentication
methods used in VPNs?
  • Answer
  • The authentication method uses an authentication
    protocol. The methods areEAP authentication
    method Extensible authentication protocol
    authenticates remote access connection. The
    authentication mechanism is decided between the
    remote VPN client and authenticator (ISA). The
    mechanism is typical in which authenticator
    requests for authentication information and the
    responses are given by the remote VPN client.

5
Question 4 What is VPN?
  • Answer
  •  A VPN is a service that offers secure, reliable
    connectivity over a shared public network
    infrastructure such as the Internet. VPNs
    maintain the same security and management
    policies as a private network. They are the most
    cost effective method of establishing a virtual
    point-to-point connection between remote users
    and an enterprise customer's network.

6
Question 5 Is VPN a long-term solution or a
short-term stop gap kind of thing?
  • Answer
  • VPNs are long-term solutions. VPNs may become
    ubiquitous and transparent to the user, but they
    will not go away. Because the problem VPNs
    address privacy over a public network will
    not go away. VPNs will exist from the desktop to
    the server, and at the IP packet level as well as
    the application data level.

7
Question 6What are the different types of VPN?
  • AnswerRemote Access VPN - Also called as Virtual
    Private dial-up network (VPDN) is mainly used in
    scenarios where remote access to a network
    becomes essential. Remote access VPN allows data
    to be accessed between a companys private
    network and remote users through a third party
    service provider Enterprise service provider.
    E.g Sales team is usually present over the globe.
    Using Remote access VPN, the sales updates can be
    made.
  • Site to Site VPN Intranet based This type of
    VPN can be used when multiple Remote locations
    are present and can be made to join to a single
    network. Machines present on these remote
    locations work as if they are working on a single
    network.
  • Site to Site VPN Extranet based This type of
    VPN can be used when several different companies
    need to work in a shared environment. E.g.
    Distributors and service companies. This network
    is more manageable and reliable.

8
Question 7 Who are the major players in the
market?
  • Answer
  • Aventail is a leader in this market. All the
    major firewall vendors and router vendors are in
    it as well. On the client side, Timestep and
    V-ONE are big.

9
Question 8What kind of performance issues does
VPN raise?
  • Answer
  • Encryption takes more horsepower than sending
    data in the clear. It really shows up on mobile
    PCs transmitting large hunks of data for
    example, a PowerPoint presentation over a
    dial-up phone line. Firewalls and other server
    systems should employ hardware crypto engines.
    With these there are no performance issues. I
    expect that this functionality for mobile PCs
    will migrate to PC cards with crypto engines.
    When will this happen? Within the next 18 months.

10
On demand Training and Talent Assessment Platform
  • VPN Online Free Interview Question
    https//goo.gl/azTwwL
  • VPN Online Free Tutorials https//goo.gl/azTwwL
  • VPN Online Free Quiz https//goo.gl/azTwwL
Write a Comment
User Comments (0)
About PowerShow.com