Lesson 10: Using Support and Scripting Tools Flashcards
RDP
Remote Desktop Protocol
FQDN
fully qualified domain name
VNC
Virtual Network Computing
MSRA
Microsoft Remote Assistance
Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop.
(allows a user to ask for help from a technician or co-worker via an invitation file protected by a passcode.)
Microsoft Remote Assistance (MSRA)
Windows support feature allowing remote screen-sharing over the Internet.
Quick assist
Quick assist key combo
CTRL+WINDOWS+Q
SSH
Secure Shell
What TCP port does SSH run over?
port 22
UEM
Unified Endpoint Management
RMM
Remote monitoring and management
MSP
managed service providers
Category of support software designed for outsourced management of client networks by MSPs.
Remote monitoring and management (RMM)
Enterprise software for controlling device settings, apps, and corporate data storage on all types of fixed, mobile, and IoT computing devices.
Desktop management unified endpoint management (UEM)
EDR
endpoint detection and response
Software agent that collects system data and logs for analysis by a monitoring system to provide early detection of threats.
endpoint detection and response (EDR)
Supported by Apple iOS and macOS, this uses Bluetooth to establish a Wi-Fi Direct connection between the devices for the duration of the file transfer. The connection is secured by the Bluetooth pairing mechanism and Wi-Fi encryption.
Airdrop
Software that allows clients to view and control the desktop over a network or the Internet.
screen-sharing
You are joining a new startup business that will perform outsourced IT management for client firms. You have been asked to identify an appropriate software solution for off-site support and to ensure that service level agreement (SLA) metrics for downtime incidents are adhered to. What general class of remote access technology will be most suitable?
Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs).
As well as remote access and monitoring, this class of tools supports management of multiple client accounts and billing/reporting.
Bluetooth-enabled sharing for Android devices.
Nearby share
Microsoft’s version of AirDrop.
Nearby sharing
Users working from home need to be able to access a PC on the corporate network via RDP. What technology will enable this without having to open the RDP port to Internet access?
Configure a virtual private network (VPN) so that remote users can connect to the corporate LAN and then launch the remote desktop protocol (RDP) client to connect to the office PC.
True or false? You can configure a web server running on Linux to accept remote terminal connections from clients without using passwords.
True.
This can be configured using public key authentication with the Secure Shell (SSH) protocol. The server can be installed with the public keys of authorized users.
You are updating a procedure that lists security considerations for remote access technologies. One of the precautions is to check that remote access ports have not been opened on the firewall without authorization. Which default port for VNC needs to be monitored?
Virtual Network Computing (VNC) uses TCP port 5900 by default.
Security copy of production data made to removable media, typically according to a regular schedule.
Backups
What are the different backup types? (3)
- full,
- incremental,
- differential
Process an organization uses to maintain the existence of and control over certain data in order to comply with business policies and/or applicable laws and regulations. (the period that any given backup job is kept for. )
Retention
Sequence of jobs starting with a full backup and followed by either incremental or differential backups to implement a media rotation scheme.
backup chain
All selected data regardless of when it was previously backed up
full backup
Job type in which all selected files that have changed since the last full or incremental backup (whichever was most recent) are backed up.
Incremental backups
New files and files modified since last full backup job
differential backup
Record of evidence-handling from collection to presentation in court to disposal.
(form record where, when, and who collected the evidence, who has handled it subsequently, and where it was stored. )
chain of custody
Job type that combines incremental backup jobs to synthesize a full backup job.
synthetic full backup
What backup issue does the synthetic job type address?
A synthetic full backup reduces data transfer requirements and, therefore, backup job time by synthesizing a full backup from previous incremental backups rather than directly from the source data.
Best practice maxim stating that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.
3-2-1 backup rule
DRM
Digital Rights Management
You are documenting workstation backup and recovery methods and want to include the 3-2-1 backup rule. What is this rule?
It states that you should have three copies of your data across two media types, with one copy held offline and offsite. The production data counts as one copy.
What frequent tests should you perform to ensure the integrity of backup settings and media?
You can perform a test restore and validate the files. You can run an integrity check on the media by using, for example, chkdsk on a hard drive used for backup. Backup software can often be configured to perform an integrity check on each file during a backup operation. You can also perform an audit of files included in a backup against a list of source files to ensure that everything has been included.
For which backup/restore issue is a cloud-based backup service an effective solution?
The issue of provisioning an off-site copy of a backup. Cloud storage can also provide extra capacity.