Question map
Not attempted Correct Incorrect Bookmarked
Loading…
Q98 (IAS/2011) Science & Technology › ICT, AI, Cybersecurity & Emerging Tech › Network security tools Answer Verified

What is “Virtual Private Network” ?

Result
Your answer:  ·  Correct: B
Explanation

A Virtual Private Network (VPN) is a technology that creates a secure, encrypted connection over a less secure network, such as the public internet. It allows users to access their organization's private network remotely while ensuring the confidentiality and integrity of the transmitted data. While the internet acts as a global electronic digital world for communicating and accessing information [1], it also presents security risks that necessitate protective measures for privacy [3]. A VPN functions by masking the user's IP address and encrypting data transfers, effectively extending a private network across a public one. This distinguishes it from cloud computing, which focuses on shared resource pools, or standard internet access [2]. Option 2 accurately describes this mechanism of providing secure access to an organization's network via the public internet, maintaining the security of the information through an encrypted 'tunnel'.

Sources

  1. [1] FUNDAMENTALS OF HUMAN GEOGRAPHY, CLASS XII (NCERT 2025 ed.) > Chapter 7: Transport and Communication > Cyber Space – Internet > p. 68
  2. [3] Political Theory, Class XI (NCERT 2025 ed.) > Chapter 1: Political Theory: An Introduction > Political Theory > p. 7
  3. [2] INDIA PEOPLE AND ECONOMY, TEXTBOOK IN GEOGRAPHY FOR CLASS XII (NCERT 2025 ed.) > Chapter 7: Transport and Communication > Personal Communication System > p. 83
How others answered
Each bar shows the % of students who chose that option. Green bar = correct answer, blue outline = your choice.
Community Performance
Out of everyone who attempted this question.
50%
got it right
✓ Thank you! We'll review this.

SIMILAR QUESTIONS

CAPF · 2022 · Q95 Relevance score: -0.25

Consider the following statements with reference to the latest guidelines issued by the Indian Computer Emergency Response Team (CERT-In): 1. Data centres and service providers shall compulsorily report cyber security breaches within 24 hours. 2. Virtual Private Network providers shall retain user data for at least five years and share records with authorities when required. Which of the statements given above is/are correct?

CDS-II · 2022 · Q116 Relevance score: -0.49

The terms 'Ethereum, Solana, Polkadot and Tether', sometimes mentioned in the news, refer to

IAS · 2024 · Q48 Relevance score: -0.51

Which one of the following words/phrases is most appropriately used to denote “an interoperable network of 3D virtual worlds that can be accessed simultaneously by millions of users, who can exert property rights over virtual items" ?

IAS · 2018 · Q66 Relevance score: -1.86

When the alarm of your smartphone rings in the morning, you wake up and tap it to stop the alarm which causes your geyser to be switched on automatically. The smart mirror in your bathroom shows the day's weather and also indicates the level of water in your overhead tank. After you take some groceries from your refrigerator for making breakfast, it recognises the shortage of stock in it and places an order for the supply of fresh grocery items. When you step out of your house and lock the door, all lights, fans, geysers and AC machines get switched off automatically. On your way to office, your car warns you about traffic congestion ahead and suggests an alternative route, and if you are late for a meeting, it sends a message to your office accordingly. In the context of emerging communication technologies, which one of the following terms best applies to the above scenario ?