Virtual Private Network (VPN) Question:
Download Questions PDF

What are some of the tough questions to pose to VPN product vendors?


Many vendors claim to be IPSEC-compliant. The real requirement should be "list the other products with which you can communicate" Also, a customer should want to know how automatic the key exchange mechanism is? In a perfect world — in an IPSEC world — it would be automatic. If a Virtual Network Perimeter (VNP, not VPN) is used, how easy is it to deploy the software to mobile PC users? How much does it interfere with normal network operation from a mobile PC, if at all? What crypto algorithms are used? What key length?

Download VPN Interview Questions And Answers PDF

Previous QuestionNext Question
What security vulnerabilities are unique to or heightened by VPN?Who are the major players in the market?