4.9 Remote Access Support Flashcards

Use remote access technologies (34 cards)

1
Q

Which protocol uses port 23?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the point of remote access protocols?

A

To allow a client to access a server or a network device remotely over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol uses port 22?

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol uses port 3389?

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should Telnet never be used for?

A

Connecting to secure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Telnet work?

A

By sending text-based commands to remote devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is the oldest network protocol (of all protocols covered)?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SSH do?

A

Encrypts all traffic between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does RDP do?

A

Provides a graphical interface to connect to another computer over a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Remote Desktop Gateway (RDG) provide a secure connection to a server?

A

By using the SSL/TLS protocols via RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a VPN do?

A

Establishes a secure connection between a client and a server over an untrusted public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where would you use Virtual Network Computing (VNC)?

A

On thin client architectures and VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol uses port 5900?

A

Virtual Network Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Desktop Infrastructure

A

Hosts a desktop environment on a centralised server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In-band management

A

Managing devices through the use of Telnet or SSH protocols over the local LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Out-of-band management

A

Connecting to and configuring different network devices using an alternate path or management network

17
Q

Why would you use out-of-band over in-band management?

A

To prevent a regular user’s machine from connecting to the management interfaces of the administrator’s devices

18
Q

Is in-band or out-of-band management more expensive for the organisation?

19
Q

Briefly explain the difference between in-band and out-of-band management

A

In: sending commands in an OS through a standard NVMe driver
Out: sending commands outside of the OS’s knowledge

20
Q

Authentication

A

Confirms and validates a user’s identity

21
Q

Authorisation

A

Gives the user proper permissions to access a resource

22
Q

Password Authentication Protocol (PAP)

A

Sends usernames and passwords in plaintext for authentication

23
Q

Challenge Handshake Authentication Protocol (CHAP)

A

Sends the client a random text string (the challenge), which is then encrypted using a password and sent back to the server

24
Q

Extensible Authentication Protocol

A

Allows for more secure authentication methods; used on encrypted networks

25
What are some authentication methods that EAP supports?
- Token cards - Smart cards - Certificates - OTP - Public key encryption
26
What sort of server should you use EAP/TLS with?
A RADIUS or TACACS+ server
27
Remote Monitoring and Management
A centralized tool used by managed service providers to manage groups of users and workstations remotely
28
Microsoft Remote Assistance (MSRA)
Will allow a user to ask for help from a technician or a coworker by using a passcode-protected imitation file
29
List three other remote access tools
- Screen-sharing software - Video conferencing software - File transfer software
30
Give two types of desktop management software
- Unified endpoint management - Endpoint detection and response
31
Which type of software allows for pushing deployment techniques?
EDR
32
Access control rules can be created by which remote software?
EDR
33
Give a simple explanation of UEM
It is the desktop/laptop version of MDM
34