2.1 Remote Access Flashcards

1
Q

What is a remote access

A

The means of providing remote connectivity to a corporate LAN through a data link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of remote access

A

To give access to LAN-based resources to employees who are off-sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Virtual Private Network (VPN)

A

En encrypted tunnel to protect transmission from any eavesdroppers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Controls that are essential for remote access :

A
  • Authentication - to know who is requesting access to the corporate LAN.
  • Encryption - to maintain the confidentiality of information being exchanged during remote access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption protocols used by VPN

A
  • SSL (Secure Sockets Layer) or TLS (Trransport Layer Security)
  • IPsec (IP Security) - for secure exchange of packets in transport and tunnel mode
  • Layer 2 Tunneling Protocol (L2TP) or PPTP (Point-to-Point Tunelling Protocol)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What types of control the encryption protocol use in VPN provide

A

Compensating controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control to access cloud-based networks resources

A

A multi factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Identification, Authentication, and Authorization

A

To control access as who or wants access to the resource, and determine if the subject is permitted to access the resource and either grant or deny thr access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Identification

A

Identification is the first step in the process of gaining entry to a system or application.
Identification is the act of asserting an identity without providing any proof of it. Identification is not usually used to protect high-value assets or functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication

A

Authentication is the next step after identification. Some form of proof of the subject’s identity is required.
Example : Password, token, biometric, smart card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Authorization

A

Authorization is the next step after authentication. At this stage, the system determines whether the subject should be permitted to access the requested resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly