Can you define in short what VPN is?
Answers were Sorted based on User's Feedback
A Virtual Private Network (VPN) is a network technology that
creates a secure network connection over a public network
such as the Internet or a private network owned by a service
provider. Large corporations, educational institutions, and
government agencies use VPN technology to enable remote
users to securely connect to a private network.
Is This Answer Correct ? | 11 Yes | 0 No |
Answer / arjun
VPN is a virtual private network used to establish a secure network connection over a insecure environment such as internet. VPN actually creates a tunnel b/w src & dst
using authentication by secure socket layer (SSL) Protocol
there are two types of VPN
1.SITE-TO-SITE
2.REMOTE ACCESS
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / rakhi
VPN is protocol which is used to access remote client through an internet.
Is This Answer Correct ? | 3 Yes | 3 No |
Answer / guest
virtual private network its used for to access remote
desktop in pc
Is This Answer Correct ? | 0 Yes | 1 No |
Answer / salman
VPN means virtual private network.
mostly used to access the other mechine remotly,
it is used in high security perpose
Is This Answer Correct ? | 0 Yes | 1 No |
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
What is difference between IPv4 & IPv6??
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
what are two security appliances that can be installed a network
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL
What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF
Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
what is used for passive intercae comand mine answer-to prevent to take update from outside