Virtual Private Network (VPN) Question: Download Questions PDF
What are some of the tough questions to pose to VPN product vendors?
Answer:
Many vendors claim to be IPSEC-compliant. The real requirement should be "list the other products with which you can communicate" Also, a customer should want to know how automatic the key exchange mechanism is? In a perfect world — in an IPSEC world — it would be automatic. If a Virtual Network Perimeter (VNP, not VPN) is used, how easy is it to deploy the software to mobile PC users? How much does it interfere with normal network operation from a mobile PC, if at all? What crypto algorithms are used? What key length?
Download VPN Interview Questions And Answers
PDF
Previous Question | Next Question |
What security vulnerabilities are unique to or heightened by VPN? | Who are the major players in the market? |