Networking Reviews

What is Virtual Private Network (VPN)

Leave a Comment

This online quiz is a series of essential questions about VPNs. Although many of the technical details of VPNs are hidden from the casual user, several aspects of the technology directly affect the “user experience,” and it is important to understand these.

Students, networking professionals, corporate employees, and anyone else interested in the basic technology of computer networks should find this a valuable study guide.

1. VPN stands for

a) Virtual Public Network
b) Virtual Protocol Network
c) Virtual Perimeter Network
d) Virtual Private Network

Answer: d) Virtual Private Network
VPN stands for “Virtual Private Network” or “Virtual Private Networking.” A VPN is a private network in the sense that it carries controlled information, protected by various security mechanisms, between known parties. VPNs are only “virtually” private, however, because this data actually travels over shared public networks instead of fully dedicated private connections.
 

2. What is the main benefit of VPNs compared to dedicated networks utilizing frame relay, leased lines, and traditional dial-up?

a) improved security
b) reduced cost
c) better network performance
d) less downtime on average

Answer: b) Reduced Cost
The main benefit of a VPN is the potential for significant cost savings compared to traditional leased lines or dial up networking. These savings come with a certain amount of risk, however, particularly when using the public Internet as the delivery mechanism for VPN data. The performance of a VPN will be more unpredictable and generally slower than dedicated lines due to public Net traffic. Likewise, many more points of failure can affect a Net-based VPN than in a closed private system. Utilizing any public network for communications naturally raises new security concerns not present when using more controlled environments like point-to-point leased lines.

3. VPNs save money by
a) reducing the need for long distance telephone calls
b) reducing the need for modem pools and remote access servers
c) reducing the need for leased lines
d) all of the above

Answer: d) All of the above
VPNs may save money in several different ways. Companies that lease private lines typically pay a very high monthly fee, and a VPN can replace these lines with much less expensive, shorter connections to a local ISP. VPNs can also support remote access connectivity for travelers. Instead of configuring remote access servers and paying for the long-distance charges to reach them, an organization can rely on an ISP to support local access on both ends of the VPN connection.

4. What is the relationship between a VPN and an extranet?

a) VPNs are unrelated to extranets
b) some extranets are VPNs and all VPNs are extranets
c) some extranets are VPNs and some VPNs are extranets
d) VPNs and extranets are two terms for the same type of network

Answer: b) some extranets are VPNs and all VPNs are extranets
Many VPNs support the same main feature of an extranet — controlled access by third parties to protected network resources. Some VPNs, however, exist only to provide remote access to employees within the organization; these are technically wide-area intranets. A few VPNs also implement local-area intranets that limit or meter access to one internal LAN from other internal LANs.

5. In VPNs, the term “tunneling” refers to
a) a marketing strategy that involves selling VPN products for very low prices in return for expensive service contracts
b) an optional feature that increases network performance if it is turned on
c) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuit
d) the method a system administrator uses to detect hackers on the network

Answer: c) the encapsulation of packets inside packets of a different protocol to create and maintain the virtual circuit

VPN tunneling transforms packets from a VPN tunneling protocol format to a different format before being transmitted over the public network. This technique, called encapsulation, is used in several network technologies besides VPN. Once encapsulated, VPN protocol packets are responsible for creating and maintaining the private connection — including set-up and tear-down details. Tunneling is the essential feature behind any VPN implementation.

6. Which of the following are VPN tunneling protocols?
a) IPSEC
b) PPTP
c) L2TP
d) All of the above

Answer: d) All of the above
PPTP, IPsec, and L2TP are three of today’s most popular VPN tunneling protocols. Each one of these is capable of supporting a secure VPN connection.

7. PPTP stands for
a) Place to Place Tunneling Protocol
b) Point to Point Tunneling Protocol
c) Pretty Pointless Traffic Producer
d) Private Protocol Transfer Process

Answer: b) All of the above

PPTP stands for Point to Point Tunneling Protocol. PPTP is a protocol specification developed by several companies. However, people generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in support for this protocol.

8. What is the basic difference between a VPN and a firewall?
a) firewalls can be configured by an administrator but VPNs cannot be configured
b) there is no fundamental difference exists between firewalls and VPNs
c) firewalls are designed to block network traffic and VPNs are designed to deliver traffic
d) firewalls are a less secure form of VPN

Answer: c) firewalls are designed to block network traffic and VPNs are designed to deliver traffic

VPNs establish a guarded connection and transmit data across that link, whereas firewalls sit at strategic locations on the network and watch for certain types of traffic to block. An appropriately configured VPN can communicate through firewalls.

9. What network port does PPTP use to establish communication?

a) 25/udp
b) 25/tcp
c) 1723/udp
d) 1723/tcp

Answer: d)1723/tcp

PPTP uses TCP port 1723 to establish a connection. When opening holes in a firewall to support PPTP, one must be careful to not specify UDP port 1723 instead of TCP.
Also, PPTP uses IP port 47, designed for “General Routing Encapsulation” or GRE packets. A common mistake in configuring firewalls for use with PPTP is to open port 1723 (allowing connections to be established) but fail to open port 47 (denying actual data from passing through the tunnel). Some operating systems include “PPTP ping” utiliies (pptpsrv and pptpclnt in Windows 2000) that verify both PPTP ports are opened.

10. Which approach to VPNs is the best one?
a) router-based
b) software only
c) VPN-specific gateway device
d) firewall-based

Answer: c) VPN Specific gateway device

 Each of these four alternatives is a viable approach to implementing a VPN, and vendors supply products in each of these areas. Some people may prefer the convenience of a “VPN in a box” as provided by special-purpose gateway devices. Those with routers and firewalls already present in their network may prefer to extend these for VPNs. Finally, those wanting to avoid hardware purchases can select a software-only VPN solution that meets their needs.

Filed Under: IP Network Tutorials Tagged With: ipsec, pptp, tunneling, virtual private network, vpn

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • VoIP Tutorial
  • In Review – Sylvania Netbook
  • Choosing the Right 7 Inch Tablet PC For You
  • Wireless Access Point Reviews – How and Why Standards Matter
  • Types Of Wireless Speaker Adapters

Categories

  • Cisco Certifications
  • Cisco Firewall
  • Computer Virus Education
  • General Technology
  • Home Computer Security
  • Home Network Setup
  • Home Security IP Cameras
  • Information Security
  • IP Network Tutorials
  • IP Telephony and VoIP
  • Network Security
  • Networking Acronyms
  • OSI Layers
  • Software Tools
  • Technology News
  • Troubleshooting
  • Usefull Network Info
  • Wii Game Console
  • Windows
  • Wireless Networks
  • XBOX and PS3 Networking
  • XBOX PS3 and Wii News

Copyright © 2025 · | Contact | About | Privacy Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT