3.5 Compare and contrast network access and management methods. Flashcards

1
Q

What is a site-to-site VPN?

A
  • Always-on connection (or almost always)
  • Firewalls often act as a VPN concentrator
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a client-to-site VPN?

A
  • On-demand access from a remote device
  • Software connects to a VPN concentrator.
  • Some software can be configured as always-on.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does it mean to be clientless?

A
  • Hypertext Mark-up Language Version 5 (HTMLv5); the language commonly used in web browsers.
  • Includes comprehensive API support
  • It creates a VPN tunnel without a separate VPN application.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a split tunnel?

A
  • VPN traffic is sent through the tunnel but NON-VPN traffic is sent normally.
  • This can be configured in the VPN software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a full tunnel?

A
  • All traffic is sent through the VPN tunnel
  • The client makes no additional forwarding decisions.
  • May require additional routing at the concentrator.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain SSH as a connection method.

A
  • encrypted console communication through TCP/22
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain GUI as a connection method.

A
  • Graphical User Interface
  • Share a desktop from a remote location (it looks like you are right there).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain API as a connection method.

A
  • Using an application programming interface allows you to automate the process of logging into multiple devices (hundreds maybe) to make changes via a batch process.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain the console as a connection method.

A
  • Directly connecting to the device
  • Traditionally a serial connection but can also connect via DB9,
    RJ45, or USB.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a jump box/host?

A
  • Provides an access mechanism to a protected network
  • Typically a highly-secured device that is hardened and monitored.
  • SSH/Tunnel/VPN to jump server then RDP/SSH or jump from there to the clients you need to access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain what in-band management means.

A
  • Assign in IP address to a device (switch, router, firewall, etc.)
  • Sometimes it may be a separate Ethernet interface
  • Sometimes the IP address is inside the device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain what out-of-band management means.

A
  • The network isn’t available or the device isn’t accessible from the network.
  • Most devices have a separate management interface (usually a serial connection / USB).
  • Connect to a modem to manage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is RDP?

A
  • Remote Desktop Protocol
  • Microsoft’s version to establish a remote connection with users.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is VNC?

A
  • Virtual Network Computing
  • It has the same functionality as RDP but can be run on many different types of operating systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly