19-A Flashcards

1
Q

What are the general guidelines for granting access to remote desktop tools?

A
  1. Use 2-Factor Authentication for remote desktop access.
  2. Utilize Robust Password Policies.
  3. Restrict access privileges based on roles and responsibilities.
  4. Grant Minimal necessary permissions to defined user groups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two end-to-end encryption protocols that could be utilized to ensure data confidentiality?

A

TLS (Transport Layer Security)
or
SSH (Secure Shell).

Both TLS and SSH use port 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What action do these protocols (TLS and SSH) perform?

A

They encrypt the data packets being transmitted between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the term Snooping mean?

A

Snooping means eavesdropping on sensitive information transmitted between the client and server. Encrypt remote sessions to prevent this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Microsoft Command Prompt command to open the dialog box allowing you to establish a secure connection between client and server.

A

mstsc.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of authentication should be employed before allowing the establishment of a remote desktop connection?

A

NLA (Network-Level Authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VNC (Virtual Network Computing) features support encryption and authentication mechanisms. What VNC variants support TLS and SSH?

A

TightVNC uses SSH tunneling
RealVNC used TLS encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of authentication helps prevent unauthorized access attempts by validating the user’s credentials before allowing the initiation of an RDP connection?

A

NLA (Network-Level Authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the common well-known port number for RDP?

A

3389

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Using RDPRA (RDP Restricted Admin) mode does what?

A

Mitigates the risk of credential theft and lateral movement in the event of a compromised RDP session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Secure Shell?

A

A cryptographic network protocol that enables secure remote access to command-line shells on remote systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between RDP and Remote Terminal?

A

RDP delivers control of a desktop image. Remote Terminal allows entry of commands into a command prompt. Both will allow a user to manage files, and perform administrative tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which authentication method offers a more secure authentication? Public Key Authentication or passwords?

A

Public key authentication offers a more secure method of authentication compared to passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What functionality is provided by Remote Monitoring and Management (RMM) ?

A

RMM solutions offer comprehensive visibility into endpoints across the network. Provides real-time monitoring of system health, performance metrics, and security status. RMM platforms enable IT administrators to proactively identify and address issues before they impact users or disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Unified Endpoint Management (UEM)?

A

Extends visibility and management capabilities beyond traditional desktops to include a wide range of endpoint devices such as laptops, smartphones, tablets, and IoT devices.

Provides centralized management interfaces for deploying policies, software updates, and security configurations across heterogeneous endpoint environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Out-of-Band (OOB) Remote Access

A

OOB management capabilities allow administrators to remotely access and manage endpoints, even if the operating system is unresponsive or offline.

17
Q

Identify the two technologies implemented by Intel and AMD for implementation of Out-of-Bounds (OOB)

A

Intel - Intel vPRO
AMD - AMD PRO

18
Q

What are the Apple and Android individual feature names that allow users to share files, photos, and links wirelessly with nearby devices.

A

Apple Airdrop
and
Android Nearby Share