Virtual Private Network (VPN) Question: Download Questions PDF
What are some of the tough questions to pose to VPN product vendors?
Many vendors claim to be IPSEC-compliant. The real requirement should be "list the other products with which you can communicate" Also, a customer should want to know how automatic the key exchange mechanism is? In a perfect world — in an IPSEC world — it would be automatic. If a Virtual Network Perimeter (VNP, not VPN) is used, how easy is it to deploy the software to mobile PC users? How much does it interfere with normal network operation from a mobile PC, if at all? What crypto algorithms are used? What key length?
Download VPN Interview Questions And Answers PDF
|Previous Question||Next Question|
|What security vulnerabilities are unique to or heightened by VPN?||Who are the major players in the market?|