CHAPTER 14: Remote Access Flashcards

1
Q

Information transmitted in a continuously variable form. Phone systems are an example of an information system that uses analog data.

A

analog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Routines used by servers to establish the identity of a remote client attempting to connect and communicate with the server.

A

authentication protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Technology that allows user data from the corporate data center to be buffered on branch servers or workstations for local client use. Local clients can access cached data instead of retieving it over the WAN again.

A

BranchCache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Digital information that describes the identity of a user or computer. A user or computer can inspect the certifi cate and decide if its validity can be trusted. Certifi cates are issued by special servers called Certifi cation Authorities (CA). If a user or computer trusts a CA, then they typically trust the certifi cates issued by the CA.

A

certifi cate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A more secure authentication protocol than PAP. CHAP is used to periodically identify the client identity without sending the actual password over the client and server data stream. CHAP passwords are simple by design and do not support strong security methods. This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.

A

Challenge-Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A replacement for VPN access to corporate intranet data sources and applications utilizing bidirectional IPv6 communication with a specialized DirectAccess server. Workstations and users connect separately, allowing corporate IT administrators to manage both.

A

DirectAccess

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A modular standard for defi ning authentication protocols that can be used to validate a computer or user. A product developer can introduce a custom authentication protocol for their product if it is not already included with Windows 7. EAP is available as an authentication standard with dial-up, VPN, and wireless connections.

A

Extensible Authentication Protocol (EAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A geographic area where a Wi-Fi wireless signal from a Wireless Access Point is available to wireless networking clients to enable network and/or Internet access.

A

hotspot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An application protocol commonly used to transfer TCP data in a secured session between a client and server. Because this is a common protocol used with Web servers, many fi rewalls allow this protocol to pass without blocking it.

A

HyperText Transport Protocol Secure (HTTPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A protocol designed to work together with IKEv2 to allow a host involved in a secure IKEv2 initiated SA to change its IP address, switch to a different network interface, or recover from a network outage.

A

IKEv2 Mobility and Multihoming Protocol (MOBIKE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A direct, digital dial-up connection to a PSTN that operates at 64 KB per channel over regular twisted-pair cable between a subscriber and the PSTN offi ce.

A

Integrated Service Digital Network (ISDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An authentication protocol that identifi es the identity of both the client and server to each other. Once the identity of both sides is established, one or more IPSec based SAs are established between them for data transfer. IKEv2 is considered a strong authentication protocol.

A

Internet Key Exchange version 2 (IKEv2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A protocol that allows a secure IP tunnel to be established with a secure HTTP connection for the purpose of transporting IPv6 packets. A IP-HTTPS client must initiate a connection to a confi gured IP-HTTPS server. The connection between client and server is not likely to be stopped by a fi rewall because the HTTPS protocol is not commonly blocked.

A

IP-HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A protocol that is used to secure and authenticate IP connections.

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A protocol used to carry PPP packets through IP networks.

A

Layer 2 Tunneling Protocol (L2TP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

See IKEv2 Mobility and Multihoming Protocol.

A

MOBIKE

17
Q

A Microsoft version of the Challenge-Handshake Authentication Protocol (CHAP). MS-CHAP-v1 adds features to change the password during a session, as well as limit authentication retries, between a client and server. MS-CHAP-v2 added the ability for both sides to confi rm each other?s identity instead of just the server confi rming the client?s identity.

A

MS-CHAP-v1&2

18
Q

A simple authentication method that establishes the identity of a remote client with the authentication password sent in the data stream between the client and server. This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.

A

Password Authentication Protocol (PAP)

19
Q

See Public Switched Telephone Network (PSTN).

A

Plain Old Telephone System (POTS)

20
Q

A network-layer transport protocol that manages connectivity over serial or modem lines. PPP can negotiate any transport protocol used by both systems involved in the link and can automatically assign TCP/IP settings.

A

Point-to-Point Protocol (PPP)

21
Q

A protocol used to carry PPP packets through IP networks.

A

Point-to-Point Tunneling Protocol (PPTP)

22
Q

An enhancement of EAP that encrypts the entire EAP process. This protects all EAP communication before authentication is performed.

A

Protected Extensible Authentication Protocol (PEAP)

23
Q

Provides a connection to subscribers for dial-up devices such as analog or ISDN modems. Originally developed to connect telephones and allow people to make analog phone calls.

A

Public Switched Telephone Network (PSTN)

24
Q

A system where clients are able to remotely connect to a network and access resources as though the remote client is connected directly to the network.

A

remote access

25
Q

A system where clients are able to remotely connect to a server to run applications and access data. Applications and fi les are accessed at the server and only screen drawing commands are sent back to the client.

A

remote control

26
Q

A protocol used to carry remote control data between the remote control client and the remotely controlled computer.

A

Remote Desktop Protocol (RDP)

27
Q

Terminal Services has been rebranded as Remote Desktop Services in Windows Server 2008 R2

A

Remote Desktop (RD)

28
Q

A service installed and confi gured on Windows Server 2003 to allow remote clients and networks to connect to network services local to the server. The Routing and Remote Access service must be confi gured to support VPN connections, dialup connections, and routed IP traffi c from routers.

A

Routing and Remote Access (RRAS)

29
Q

A protocol that allows secure communication between a VPN client and server using the SSL based encryption methods of HTTPS. The connection between client and server is not likely to be stopped by a fi rewall because the HTTPS protocol is not commonly blocked.

A

Secure Socket Tunneling Protocol (SSTP)

30
Q

A connection established between two computers for the purpose of securely exchanging data. The connection is only allowed if both sides of the connection know how to fi nd each other on the network, agree on how to authenticate their identities, and agree on how to encrypt and decrypt the data sent between them. Any aspect of the SA connection may be renegotiated periodically to ensure that the other side of the connection is still a valid communication partner.

A

Security Association (SA)

31
Q

An implementation of the IP protocol over serial lines. SLIP has been made obsolete by PPP.

A

Serial Line IP (SLIP)

32
Q

A small physical card that contains a processor and memory. The processor is capable of interacting with a computer in which the card is plugged. The most common use of a smart card is to store and validate personal security credentials for a computer or user. The smart card can be physically removed and stored in a small space, such as a wallet.

A

smart card

33
Q

A service that can be installed on a computer running a server-based operating system. Depending on licensing limits, multiple users can connect to the Terminal Server and run applications on the Terminal Server using only a remote control client. Each remote user is unaware that other users are also remote controlling applications on the Terminal Server.

A

Terminal Services (TS)

34
Q

A remote access technology that creates an encrypted tunnel for communication between the VPN client and a remote access server. VPN connections are commonly used over the Internet to secure communication when accessing offi ce data from home.

A

virtual private network (VPN)

35
Q

A geographically dispersed network connected by routers and communication links. The Internet is the largest WAN.

A

Wide Area Network (WAN)

36
Q

A networking technology standard that defi nes packet switching networks used for WAN connectivity.

A

X.25