Virtual Private Network (VPN) Question: Download Questions PDF
What crypto issues are relevant in the VPN context?
Businesses who understand the use of crypto for privacy in electronic documents also understand the need for the emergency recovery of that data. Whether this is done by saving an individual's private key information, encrypting it with a trusted third party's key, or saving all keys used to encrypt all documents, it is well understood that some mechanism is needed for the recovery of encrypted files owned by an individual, by the individual, or a company, by the company for business or law enforcement reasons. Key recovery of session keys used to encrypt a network connection is a requirement of law enforcement. VPNs must use the strongest crypto available and feasible given the hardware on which it is being run. Weak cryptography (for example, 40 bit key length) should be completely avoided.
Download VPN Interview Questions And Answers PDF
|Previous Question||Next Question|
|What kind of performance issues does VPN raise?||Are VPNs used for specific kinds of applications or environments? If so, what are some examples of where and why VPNs would be deployed?|