2. Answer:
• Trusted networks: Such Networks allow data to be transferred
transparently. The machines using a trusted network are usually
administered by an Administrator to ensure that private and secured
data is not leaked. Access to this network is limited. Computers using
trusted networks are more secured and confidential because of strong
firewalls.
Untrusted networks: Such networks are usually administered by the
owners. They can allow improper access to sensitive or personal data.
These machines are usually separate. Such machines could me more
prone to attacks.
Question: 1 What is Trusted and Untrusted Networks?
3. Answer:
• Those companies who were early adopters of firewalls are the ones using
VPNs today. VPNs are still early in the use cycle. Three years ago, they hardly
existed. Then firewall products started to include them — first ANS Interlock,
then TIS Gauntlet. Soon, customers started demanding VPN functionality in
their firewalls, even though few of them actually used it. But the Security
Architecture for Internet Protocol (IPSEC) standard is changing that — with
IPSEC-compliant off-the-shelf products, using encryption to protect the
privacy of communications will be an automatic decision. It may take awhile. I
predicted that 1998 would be the "Year of the VPN," but maybe 1999 is more
realistic. Look, over four years after the famous Internet password sniffing
incident, most people still seem to be working with reusable passwords.
Question: 2 Is there market penetration for these products?
4. Answer:
• The authentication method uses an authentication protocol. The
methods are:
EAP authentication method: Extensible authentication protocol
authenticates remote access connection. The authentication
mechanism is decided between the remote VPN client and
authenticator (ISA). The mechanism is typical in which authenticator
requests for authentication information and the responses are given by
the remote VPN client.
Question: 3
What are the different authentication
methods used in VPNs?
5. Answer:
A VPN is a service that offers secure, reliable connectivity over a shared
public network infrastructure such as the Internet. VPNs maintain the
same security and management policies as a private network. They are
the most cost effective method of establishing a virtual point-to-point
connection between remote users and an enterprise customer's network.
Question: 4 What is VPN?
6. Answer:
• VPNs are long-term solutions. VPNs may become ubiquitous and
transparent to the user, but they will not go away. Because the
problem VPNs address — privacy over a public network — will not go
away. VPNs will exist from the desktop to the server, and at the IP
packet level as well as the application data level.
Question: 5 Is VPN a long-term solution or
a short-term stop gap kind of thing?
7. Answer:Remote Access VPN - Also called as Virtual Private dial-up network
(VPDN) is mainly used in scenarios where remote access to a network becomes
essential. Remote access VPN allows data to be accessed between a company’s
private network and remote users through a third party service provider;
Enterprise service provider. E.g Sales team is usually present over the globe.
Using Remote access VPN, the sales updates can be made.
Site to Site VPN – Intranet based: This type of VPN can be used when multiple
Remote locations are present and can be made to join to a single network.
Machines present on these remote locations work as if they are working on a
single network.
Site to Site VPN – Extranet based: This type of VPN can be used when several
different companies need to work in a shared environment. E.g. Distributors and
service companies. This network is more manageable and reliable.
Question: 6
What are the different types of VPN?
8. Answer:
• Aventail is a leader in this market. All the major firewall vendors and
router vendors are in it as well. On the client side, Timestep and V-ONE
are big.
Question: 7 Who are the major players in
the market?
9. Answer:
Encryption takes more horsepower than sending data in the clear. It really
shows up on mobile PCs transmitting large hunks of data — for example,
a PowerPoint presentation — over a dial-up phone line. Firewalls and
other server systems should employ hardware crypto engines. With these
there are no performance issues. I expect that this functionality for
mobile PCs will migrate to PC cards with crypto engines. When will this
happen? Within the next 18 months.
Question: 8
What kind of performance issues does VPN
raise?
10. VPN Online Free Interview Question https://goo.gl/azTwwL
VPN Online Free Tutorials https://goo.gl/azTwwL
VPN Online Free Quiz https://goo.gl/azTwwL
On demand Training and Talent Assessment Platform