4.9 Remote Access Support Flashcards

Use remote access technologies

1
Q

Which protocol uses port 23?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the point of remote access protocols?

A

To allow a client to access a server or a network device remotely over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which protocol uses port 22?

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which protocol uses port 3389?

A

Remote Desktop Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What should Telnet never be used for?

A

Connecting to secure devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does Telnet work?

A

By sending text-based commands to remote devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which is the oldest network protocol (of all protocols covered)?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does SSH do?

A

Encrypts all traffic between the client and the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does RDP do?

A

Provides a graphical interface to connect to another computer over a network connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does Remote Desktop Gateway (RDG) provide a secure connection to a server?

A

By using the SSL/TLS protocols via RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a VPN do?

A

Establishes a secure connection between a client and a server over an untrusted public network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where would you use Virtual Network Computing (VNC)?

A

On thin client architectures and VDI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol uses port 5900?

A

Virtual Network Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virtual Desktop Infrastructure

A

Hosts a desktop environment on a centralised server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In-band management

A

Managing devices through the use of Telnet or SSH protocols over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Out-of-band management

A

Connecting to and configuring different network devices using an alternate path or management network

17
Q

Why would you use out-of-band over in-band management?

A

To prevent a regular user’s machine from connecting to the management interfaces of the administrator’s devices

18
Q

Is in-band or out-of-band management more expensive for the organisation?

A

Out-of-band

19
Q

Briefly explain the difference between in-band and out-of-band management

A

In: sending commands in an OS through a standard NVMe driver
Out: sending commands outside of the OS’s knowledge

20
Q

Authentication

A

Confirms and validates a user’s identity

21
Q

Authorisation

A

Gives the user proper permissions to access a resource

22
Q

Password Authentication Protocol (PAP)

A

Sends usernames and passwords in plaintext for authentication

23
Q

Challenge Handshake Authentication Protocol (CHAP)

A

Sends the client a random text string (the challenge), which is then encrypted using a password and sent back to the server

24
Q

Extensible Authentication Protocol

A

Allows for more secure authentication methods; used on encrypted networks

25
Q

What are some authentication methods that EAP supports?

A
  • Token cards
  • Smart cards
  • Certificates
  • OTP
  • Public key encryption
26
Q

What sort of server should you use EAP/TLS with?

A

A RADIUS or TACACS+ server

27
Q

Remote Monitoring and Management

A

A centralized tool used by managed service providers to manage groups of users and workstations remotely

28
Q

Microsoft Remote Assistance (MSRA)

A

Will allow a user to ask for help from a technician or a coworker by using a passcode-protected imitation file

29
Q

List three other remote access tools

A
  • Screen-sharing software
  • Video conferencing software
  • File transfer software
30
Q

Give two types of desktop management software

A
  • Unified endpoint management
  • Endpoint detection and response
31
Q

Which type of software allows for pushing deployment techniques?

A

EDR

32
Q

Access control rules can be created by which remote software?

A

EDR

33
Q

Give a simple explanation of UEM

A

It is the desktop/laptop version of MDM

34
Q
A