Implementing Remote Access Technologies Flashcards
Remote connections
There are several types, including virtual private networks (VPNs), sharing of control, Remote Desktop Connection and Remote Desktop Protocol (RDP), and Secure Shell (SSH).
VPNs
Combination of private and public network links.
Secure connections.
Two protocols:
Tunneling: Includes Point-to-Point Tunneling Protocol (PPTP) and Layer Two Tunneling Protocol (L2TP).
Encryption: Includes Microsoft Point-to-Point Encryption (MPPE) and Internet Protocol Security (IPSec).
Sharing control
There are two types:
Virtual network computer (VNC): Lacks security.
Microsoft Remote Assistance (MSRA):
Good for home environments.
Has a graphical user interface (GUI).
Remote Desktop Connection/Remote Desktop Protocol
Implements security.
Windows primary remote-control protocol.
GUI-based.
Secure Shell
Implements strong security.
Remote configuration protocol.
Commonly used with Linux and networking systems.
Has a command-line interface (CLI).
Third-party tools for remote-access scenarios
Screen-sharing and video conferencing:
Zoom
Microsoft Teams
Google Meet
TeamViewer
File-transfer software:
Dropbox
Microsoft OneDrive
Google Drive
Desktop-management software:
Microsoft Endpoint Manager
ManageEngine Desktop Central
Remote monitoring and management (RMM)
Utilized by Managed Service Providers (MSPs) to proactively monitor computing systems and networks.