placeholder image to represent content

DFN5033 CHP3 P5 VPN

Quiz by Shahidayu Othman

Feel free to use or edit a copy

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

With a free account, teachers can
  • edit the questions
  • save a copy for later
  • start a class game
  • view complete results in the Gradebook and Mastery Dashboards
  • automatically assign follow-up activities based on students’ scores
  • assign as homework
  • share a link with colleagues
  • print as a bubble sheet

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
19 questions
Show answers
  • Q1
    Define VPN
    Visually Private Network
    Visually Personal Network
    Virtual Private Network
    Virtual Personal Network
    30s
  • Q2
    Which of the following security technique provides the highest "confidentiality service"?
    Hashing
    Key exchange
    Encryption
    Firewall
    30s
  • Q3
    How many layers are in the TCP/IP model?
    4
    3
    7
    5
    30s
  • Q4
    Which of the following is NOT a feature of a VPN?
    It may use tunneling techniques
    It is a secured network
    It is deployed over a shared infrastructure
    It does not provide any cost savings to alternate connectivity options
    30s
  • Q5
    A service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions.
    Firewall
    TSL
    VPN
    SSL
    30s
  • Q6
    What is the function of VPN client (software)?
    Encrypt data and change IP address
    Open the connection to public
    Change the MAC address
    Transmit data packets
    30s
  • Q7
    Which of the following is NOT the characteristics of VPN?
    Privacy when browsing the internet site
    Destination site see the packet coming from VPN server
    It activates the Intrusion Detection System against active and passive threats
    Encrypted data in transit
    30s
  • Q8
    Which of the below scenarios require the use of VPN the most?
    WiFi in a workplace
    WiFi in school
    WiFi in home
    WiFi in a coffee shop
    30s
  • Q9
    Which of the following require LESS reason to use the VPN?
    Organisations
    Businesses
    Governments
    Individuals
    30s
  • Q10
    If you are a mobile employee (teleworker), which technology you need the most for the security and privacy ?
    VPN
    A pc with i8 processor
    Firewall
    500 mbps internet connection
    30s
  • Q11
    Which of the following is not something VPN can promise to?
    Anonymity
    Security
    Reliability
    Privacy
    30s
  • Q12
    VPN protects your privacy. Which of the following is the technique VPN uses to do so?
    Tunneling
    Hiding your MAC address
    Enabling protection tools like anti-virus programs
    Backchanneling
    30s
  • Q13
    Using a VPN means adding in another ...... into the communication between your computer and the requested web server.
    Firewall
    VPN Server
    Layer onto OSI Model
    ISP
    30s
  • Q14
    Using VPN means changing your ....... of your web requests.
    Domain
    MAC Address
    Time
    Location
    30s
  • Q15
    Changing simple text and other information that can be accessed by the authorized entity with a decryption key is called ...
    Authentication
    Cryptography
    Encryption
    Hashing
    30s

Teachers give this quiz to your class