Virtual Private Network (VPN) Interview Questions

 
1.
What is a Virtual Private Network (VPN)?
2.
Is there market penetration for these products?
3.
Is VPN a long-term solution or a short-term stop gap kind of thing?
4.
What security vulnerabilities are addressed by VPN?
5.
What security vulnerabilities are unique to or heightened by VPN?
6.
What are some of the tough questions to pose to VPN product vendors?
7.
Who are the major players in the market?
8.
What kind of performance issues does VPN raise?
9.
What crypto issues are relevant in the VPN context?
10.
Are VPNs used for specific kinds of applications or environments? If so, what are some examples of where and why VPNs would be deployed?
11.
Are there applications or environments in which VPNs would really be detrimental?
12.
What is the relationship between VPN and firewalls?
13.
What firewall issues are relevant to VPN selection and deployment?
14.
What kind of resources (staff, computational muscle, bandwidth, etc.) are required for VPN deployment, usage, maintenance?
15.
What are reasonable expectations for a VPN?
16.
What are unreasonable expectations for VPN?
17.
What kind of policies and procedures need to be developed for VPN?
18.
Can you list some items for a VPN checklist from deciding whether to use, then selecting, then deploying, then maintaining VPN?
19.
What is a Virtual Private Network (VPN)?
20.
Is there market penetration for these products?
21.
Is VPN a long-term solution or a short-term stop gap kind of thing?
22.
What security vulnerabilities are addressed by VPN?
23.
What security vulnerabilities are unique to or heightened by VPN?
24.
What are some of the tough questions to pose to VPN product vendors?
25.
Who are the major players in the market?
26.
What kind of performance issues does VPN raise?
27.
What crypto issues are relevant in the VPN context?
28.
Are VPNs used for specific kinds of applications or environments? If so, what are some examples of where and why VPNs would be deployed?
29.
Are there applications or environments in which VPNs would really be detrimental?
30.
What is the relationship between VPN and firewalls?
31.
What firewall issues are relevant to VPN selection and deployment?
32.
What kind of resources (staff, computational muscle, bandwidth, etc.) are required for VPN deployment, usage, maintenance?
33.
What are reasonable expectations for a VPN?
34.
What are unreasonable expectations for VPN?
35.
What kind of policies and procedures need to be developed for VPN?
36.
Can you list some items for a VPN checklist from deciding whether to use, then selecting, then deploying, then maintaining VPN?
37.
What is a Virtual Private Network (VPN)?
38.
Is there market penetration for these products?
39.
Is VPN a long-term solution or a short-term stop gap kind of thing?
40.
What security vulnerabilities are addressed by VPN?
41.
What security vulnerabilities are unique to or heightened by VPN?
42.
What are some of the tough questions to pose to VPN product vendors?
43.
Who are the major players in the market?
44.
What kind of performance issues does VPN raise?
45.
What crypto issues are relevant in the VPN context?
46.
Are VPNs used for specific kinds of applications or environments? If so, what are some examples of where and why VPNs would be deployed?
47.
Are there applications or environments in which VPNs would really be detrimental?
48.
What is the relationship between VPN and firewalls?
49.
What firewall issues are relevant to VPN selection and deployment?
50.
What kind of resources (staff, computational muscle, bandwidth, etc.) are required for VPN deployment, usage, maintenance?
51.
What are reasonable expectations for a VPN?
52.
What are unreasonable expectations for VPN?
53.
What kind of policies and procedures need to be developed for VPN?
54.
Can you list some items for a VPN checklist from deciding whether to use, then selecting, then deploying, then maintaining VPN?
55.
What is a Virtual Private Network (VPN)?
56.
Is there market penetration for these products?
57.
Is VPN a long-term solution or a short-term stop gap kind of thing?
58.
What security vulnerabilities are addressed by VPN?
59.
What security vulnerabilities are unique to or heightened by VPN?
60.
What are some of the tough questions to pose to VPN product vendors?
61.
Who are the major players in the market?
62.
What kind of performance issues does VPN raise?
63.
What crypto issues are relevant in the VPN context?
64.
Are VPNs used for specific kinds of applications or environments? If so, what are some examples of where and why VPNs would be deployed?
65.
Are there applications or environments in which VPNs would really be detrimental?
66.
What is the relationship between VPN and firewalls?
67.
What firewall issues are relevant to VPN selection and deployment?
68.
What kind of resources (staff, computational muscle, bandwidth, etc.) are required for VPN deployment, usage, maintenance?
69.
What are reasonable expectations for a VPN?
70.
What are unreasonable expectations for VPN?
71.
What kind of policies and procedures need to be developed for VPN?
72.
Can you list some items for a VPN checklist from deciding whether to use, then selecting, then deploying, then maintaining VPN?