Exam Compass - Remote Access Technologies Quiz Flashcards

1
Q

Which of the following answers describe the features of RDP? (Select 3 answers)
Permanent remote access
The host and invited user share control over host’s mouse and keyboard
Access based on local password (local user account password)
Windows tool used for connecting remotely to the user’s own computer
The host and invited user can both see the host’s screen
Windows tool used for assisted remote troubleshooting
Access based on one-time password
Temporal remote access

A

Permanent remote access

Access based on local password (local user account password)

Windows tool used for connecting remotely to the user’s own computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the answers listed below refers to a dedicated device for managing encrypted connections established over an untrusted network, such as the Internet?
VPN concentrator
Load balancer
Managed switch
Multilayer switch

A

VPN concentrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The term “Always-on VPN” refers to a type of persistent VPN connection the starts automatically as soon as the computer detects a network link.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which VPN type is used for connecting computers to a network? (Select 2 answers)
Remote access
Intranet-based
Client-to-site
Site-to-site
Extranet-based

A

Remote access

Client-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of VPN enables connectivity between two networks?
Site-to-site
Host-to-network
Remote access
Client-to-site

A

Site-to-site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of protocols used for implementing secure VPN tunnels include: (Select 2 answers)
PPP
bcrypt
IPsec
SRTP
TLS

A

IPsec

TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An HTML5 VPN portal is an example of clientless VPN implementation where an HTML5-compliant web browser along with TLS encryption can be used instead of a dedicated VPN client software.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following answers refers to a non-proprietary remote-access protocol that enables control over another computer on the network with the use of GUI?
VTP
VRF
VTC
VNC

A

VNC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers is known as:
TFTP
SSH
Telnet
RDP

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the answers listed below refers to a secure replacement for Telnet?
CHAP
FTP
SNMP
SSH

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following enables remote control over network devices?
RMM
UAC
SNMP
API

A

RMM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refer(s) to MSRA? (Select all that apply)
Access based on one-time password
Temporal remote access
Access based on local password (local user account password)
The host and invited user can both see the host’s screen
Windows tool used for connecting remotely to the user’s own computer
The host and invited user share control over host’s mouse and keyboard
Permanent remote access
Windows tool used for assisted remote troubleshooting

A

Access based on one-time password

Temporal remote access

The host and invited user can both see the host’s screen

The host and invited user share control over host’s mouse and keyboard

Windows tool used for assisted remote troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly