8-9 Flashcards

1
Q

collection

A

An entity that contains remote access servers. Each collection allows specific groups of users in your Active Directory domain access to Remote Desktop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

constraint

A

A section of a remote access policy that contains characteristics that must be met for remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

demand-dial interface

A

An interface that automatically creates a VPN connection to a NAT router when it receives traffic destined for a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

demarc

A

The point in a network infrastructure that connects to the ISP using a last mile technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

demarcation point

A

The point in a network infrastructure that connects to the ISP using a last mile technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dial-in permission

A

Permission to access a network remotely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

dial-up remote access

A

Access used before Internet access became common. In this case

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DirectAccess

A

A remote access technology that automatically creates IPSec tunnels to a remote access server when remote access clients are outside of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DirectAccess Connectivity Assistant

A

A tool administrators use to improve an enterprise’s DirectAccess connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Generic Routing Encapsulation (GRE)

A

A protocol that provides a private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Gigabit Passive Optical Network (GPON)

A

A last mile technology that uses fiber optic cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Key Exchange version 2 (IKEv2)

A

An enhancement to IPSec that provides VPN tunneling with faster speeds compared to L2TP. It uses 256-bit encryption keys and requires that remote access clients and servers authenticate to each other using an IPSec encryption certificate or preshared key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Security (IPSec)

A

A secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

last mile technology

A

A technology that spans the “last mile” between the Internet and the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Layer Two Tunneling Protocol (L2TP)

A

A VPN protocol developed by Microsoft and Cisco. It provides for tunneling only and relies on IP Security (IPSec) for the encryption of data packets using encryption keys varying in length from 56 to 256 bits. To participate in an L2TP VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

long-range Wi-Fi

A

A last mile technology that uses radio wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Microsoft Point-to-Point Encryption (MPPE)

A

An encryption technique used in PPTP. Although MPPE supports encryption keys varying in length from 40 to 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Network Connectivity Assistant

A

A DirectAccess service that probes a network location server using HTTPS each time a client network interface is activated on a network to determine whether the client is located on a network outside the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

network location server

A

A website that is used to detect whether DirectAccess clients are located in the corporate network. Clients in the corporate network do not use DirectAccess to reach internal resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Network Policy and Access Services

A

A component of Windows Server. It replaces the Internet Authentication Service (IAS) from Windows Server 2003. NPAS helps an administrator safeguard the health and security of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Network Policy Server

A

NPS is installed when you install the Network Policy and Access Services (NPAS) feature in Windows Server 2016 and Server 2019. NPS allows you to create and enforce organization-wide network access policies for connection request authentication and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Next Generation Firewall (NGFW)

A

A network security device that provides capabilities beyond a traditional

23
Q

overlay network

A

The virtual network that is created by a VPN.

24
Q

Point-to-Point Protocol

A

A data link layer communications protocol between two routers directly without any host or any other networking in between. It can provide connection authentication transmission encryption

25
Q

Point-to-Point Protocol over Ethernet (PPPoE)

A

network protocol for encapsulating PPP frames inside Ethernet frames.

26
Q

Point-to-Point Tunneling Protocol (PPTP)

A

One of the oldest and most widely supported VPN protocols. It was developed by a consortium of vendors including Microsoft and encrypts data using Microsoft Point-to-Point Encryption (MPPE). Although MPPE supports encryption keys varying in length from 40 to 128 bits

27
Q

port forwarding

A

An application of network address translation that redirects a communication request from one address and port number combination to another while the packets are traversing a network gateway

28
Q

RADIUS client

A

A RADIUS-enabled device at the network perimeter that enforces access control for users attempting to access network resources.

29
Q

remote access

A

The process of connecting to server resources within a DMZ from a location outside of the organization hosting the DMZ. A service used to access a network remotely.

30
Q

remote access client

A

An Internet user that requests access to a server in the DMZ.

31
Q

Remote Access Dial-In User Authentication Service (RADIUS)

A

A client/server protocol and software that enable remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.

32
Q

Remote Access Management Console

A

Tool used to configure and manage DirectAccess.

33
Q

remote access policy

A

A policy that contains conditions that must be met for the policy to apply to the remote access client.

34
Q

remote access server

A

A server that accepts requests from remote access clients on the Internet.

35
Q

Remote Desktop

A

A remote access technology that uses a different method to achieve remote access compared to VPNs and DirectAccess. Instead of relaying network traffic through an encrypted tunnel to a DMZ

36
Q

Remote Desktop app

A

An app used by remote access clients to log into a remote access server to obtain a graphical desktop session on the remote access server itself.

37
Q

Remote Desktop Connection

A

The default Remote Desktop app

38
Q

Remote Desktop Protocol (RDP)

A

A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection. The user employs RDP client software for this purpose

39
Q

Remote Desktop Services

A

One of the components of Microsoft Windows that allows a user to take control of a remote computer or virtual machine over a network connection.

40
Q

RemoteApp

A

A virtual application solution that allows users to run Windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if they are installed locally

41
Q

RemoteApp and Desktop Connections

A

A tool that helps in taking control of remote Windows computers and troubleshooting them remotely.

42
Q

reverse proxy

A

A type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client

43
Q

Routing and Remote Access

A

A Microsoft API and server software that make it possible to create applications to administer the routing and remote access service capabilities of the operating system to function as a network router. Developers can also use RRAS to implement routing protocols.

44
Q

Secure Socket Tunneling Protocol (SSTP)

A

A VPN technology that tunnels data through HTTPS packets on a network. It originally used Secure Sockets Layer (SSL) encryption with 128-bit keys. However

45
Q

Secure Sockets Layer (SSL)

A

A networking protocol designed for securing connections between Web clients and Web servers over an insecure network

46
Q

service forwarding

A

Allows requests for a particular port or service to be forwarded to an internal server in the DMZ.

47
Q

session-based desktop deployment

A

An individual session running inside a server operating system on either a virtual machine or a physical server. There can be multiple user sessions per virtual/physical machine; i.e.

48
Q

split tunneling

A

A concept that allows a user to access dissimilar security domains like a public network and a local LAN or WAN at the same time

49
Q

Transport Layer Security (TLS)

A

A protocol used to provide privacy and data integrity between two or more communicating computer applications.

50
Q

virtual machine-based desktop deployment

A

An individual virtual machine running a desktop operating system. Each user connects to their own virtual desktop client system.

51
Q

virtual private networks (VPNs)

A

Networks that extend a private network across a public network and enable users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

52
Q

VPN protocol

A

A set of rules that are used to negotiate a connection between the VPN client and the VPN server. At the moment

53
Q

VPN tunnel

A

An encrypted link between your computer or mobile device and an outside network. A VPN tunnel—short for virtual private network tunnel—can provide a way to cloak some of your online activity.