19A - Use Remote Access Technologies Flashcards
What are the general guidelines for granting access to remote desktop tools?
- Use 2-Factor Authentication for remote desktop access.
- Utilize Robust Password Policies.
- Restrict access privileges based on roles and responsibilities.
- Grant Minimal necessary permissions to defined user groups.
What are the two end-to-end encryption protocols that could be utilized to ensure data confidentiality?
TLS (Transport Layer Security)
or
SSH (Secure Shell).
Both TLS and SSH use port 443
What action do these protocols (TLS and SSH) perform?
They encrypt the data packets being transmitted between the client and server.
What does the term Snooping mean?
Snooping means eavesdropping on sensitive information transmitted between the client and server. Encrypt remote sessions to prevent this.
What is the Microsoft Command Prompt command to open the dialog box allowing you to establish a secure connection between client and server.
mstsc.exe
What type of authentication should be employed before allowing the establishment of a remote desktop connection?
NLA (Network-Level Authentication)
VNC (Virtual Network Computing) features support encryption and authentication mechanisms. What VNC variants support TLS and SSH?
TightVNC uses SSH tunneling
RealVNC used TLS encryption
What type of authentication helps prevent unauthorized access attempts by validating the user’s credentials before allowing the initiation of an RDP connection?
NLA (Network-Level Authentication)
What is the common well-known port number for RDP?
3389
Using RDPRA (RDP Restricted Admin) mode does what?
Mitigates the risk of credential theft and lateral movement in the event of a compromised RDP session.
What is Secure Shell?
A cryptographic network protocol that enables secure remote access to command-line shells on remote systems.
What is the difference between RDP and Remote Terminal?
RDP delivers control of a desktop image. Remote Terminal allows entry of commands into a command prompt. Both will allow a user to manage files, and perform administrative tasks.
Which authentication method offers a more secure authentication? Public Key Authentication or passwords?
Public key authentication offers a more secure method of authentication compared to passwords.
What functionality is provided by Remote Monitoring and Management (RMM) ?
RMM solutions offer comprehensive visibility into endpoints across the network. Provides real-time monitoring of system health, performance metrics, and security status. RMM platforms enable IT administrators to proactively identify and address issues before they impact users or disrupt operations.
What is Unified Endpoint Management (UEM)?
Extends visibility and management capabilities beyond traditional desktops to include a wide range of endpoint devices such as laptops, smartphones, tablets, and IoT devices.
Provides centralized management interfaces for deploying policies, software updates, and security configurations across heterogeneous endpoint environments.