Operational Procedures: Given a scenario user remote access technologies Flashcards

CompTIA A+ 220-1102 Exam Criteria

1
Q

Why do we work with Remote Access Technologies?

A

Remote Desktop Protocol is a remote connection protocol that allows users to directly connect one device to a Windows OS device. Port 3389 is used for Remote Desktop Protocol. It is a built-in remote management tool in Windows 10. You can connect to another computer’s desktop using RDP, allowing you to work on the device remotely like you were sitting in front of it. You can troubleshoot issues and errors. Administrators can RDP to a Windows device and take over control of the system. Only one user can be signed in at a time, and the administrator takes precedence, and the user would be signed off. By default, the Remote Desktop feature is enabled in Windows 10.

Remote Assistance allows a user to request help from a technician. An email will be sent to the technician, and a password will have to be provided to secure the connection. Quick Assist is an update to Remote Assistance that allows a technician the ability to give a code to users to help them. The user enters it on their machine, and a series of permission checks are done before the connection is made. Using either Remote Assistance or Quick Assist, the technicians can simply view the user’s screen or take control of the computer. The user will be able to view the screen at all times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How do you Secure a Remote Desktop Connection?

A

When users virtually connect to a Windows system from another computer, they have complete access to the operating system, even though they are not in front of it. Although Remote Desktop has practical usage in different scenarios, there are obvious security risks as well. For example, a hacker may gain access to the user’s credentials and attempt to connect to the system remotely.

Click the Start charm and type the following:

local security policy > Select Local Security Policy from the Best match pop-up menu.

In the Local Security Policy window, expand Local Policies on the left pane. > Select User Rights Assignment. > Double-click on the Allow log on through Remote Desktop Services policy on the right details pane

On the Allow log on through Remote Desktop Services Properties dialog box, notice that there are two groups added on the Local Security Setting tab.

Any user who is part of these groups will be allowed remote access to the PLABWIN10 device. You can restrict access to a specific user account.

Select Administrators, press the Shift key and then select Remote Desktop Users.

Click Remove. > Both groups have now been removed.

Click Add User or Group.

From the Select Users, Computers, Service Accounts, or Groups dialog box, type the following for the Enter the object names to select field:

Administrator

Click Check Names.

In the Multiple Names Found dialog box, the Administrator user account, is selected by default.

Back on the Select Users, Computers, Service Accounts, or Groups dialog box, notice that the Administrator account is now added. > Click OK

On the Allow log on through Remote Desktop Service Properties dialog box, notice that the PRACTICELABS\Administrator account is now added. > Click Ok

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Remote Assistance?

A

Microsoft Remote Assistance is a Windows utility that allows users to ask for assistance with invitations. The invitation can be sent as an attachment in an email or by using quick connect. The technician would then connect to the session and enter the password. At that point, they would be able to access the shared screen, and the user could receive the assistance they requested. Since the release of Quick Assist in Windows 10, Remote Assistance has been, in a way, decommissioned. Any easy links to it have been removed, and Quick assist is now the preferred method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Quick Assist?

A

Quick Assist is part of the Remote Desktop Protocol family and is also used to assist users. The user receives a code from the technician and can share their screen once the code is used. The technician then receives an invitation and has the option of just viewing or being able to control the machine. Once the selection is made, one last set of permission is sent back to the user needing assistance to start the session. There are controls in the Quick Assist window to end a session and to take control back from the technician. Quick Assist was introduced in Windows 10 and is an update to remote assistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is VNC?

A

Another type of Remote Desktop Connection is Virtual Network Computing. Different vendors provide VNC applications, several of which are open source. Virtual Network Computing is the process of connecting to a remote device to manage the device remotely. The local user connected to the device can see what the remote user is doing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the fundamental differences between VNC and RDP?

A

The fundamental difference between VNC and RDP is that the local user will not see what the remote user is doing when an RDP session is initiated.

VNC gives a similar experience across all operating systems but with fewer features and capabilities than RDP. VNC is sluggish and ineffective for virtualization. VNC has the potential to be less secure than RDP. Both technologies give users the ability to troubleshoot issues for users and remotely connect for productivity. Users would use RDP if they needed to file share. Users would use VNC for uses like presentations. VNC will use port 5900 by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why would you use Secure Shell Protocol?

A

Like RDP, secure Shell SSH is a popular way to log on to and administer computers in a secure manner. SSH operates on three main principles:

The transport layer is responsible for server authentication

The user authentication protocol validates the user

The connection protocol creates the encrypted tunnel

It’s a secure alternative to insecure methods like Telnet that sends information in plain text. Through encryption, SSH enables safe communication and preserves the integrity of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a VPN used for?

A

Virtual Private Networks are used to keep information private over unsecure networks. VPNs can be used to connect remote users to their offices, secure shopping and banking data, use public Wi-Fi, or maintain anonymity while browsing the Internet. The data remains hidden using encapsulation, tunneling and encryption. Users will connect to a Virtual Private Network server and will be authenticated. Any information that is then sent is encrypted and wrapped in another packet that is encrypted as well. Once the data is received on the other end, the outer packet is removed, and the information decrypted for use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to set up a VPN connection?

A

Right-click on the Start charm and select Settings. > From the Windows Settings window, select Network & Internet. > In the Settings window, select VPN on the left pane. > Click + Add a VPN connection on the VPN pane.

In the Add a VPN connection, change the VPN provider drop-down to Windows (built-in).

Type the following:

Connection name: TestConnect
Server name or address: 192.168.255.13

clickSave. Back on the Settings - VPN pane, select Change adapter options under the Related settings section.

In the Network Connections window, right-click on TestConnect and select Properties.

From the TestConnect Properties dialog box, select the Networking tab.

On the TestConnect Properties - Networking tab, select Internet Protocol Version 4(TCP/IPv4).

Select Properties.

On the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, you can set a static IP address instead of an automatically assigned IP address from the DHCP Server.

You can also set a DNS server and Alternate DNS Server statically.

Click Advanced. > On the Advanced TCP/IP Settings dialog box, deselect Use default gateway on remote network.

Click OK. > Back on the Internet Protocol Version 4 (TCP/IPv4) Properties dialog box, click OK.

On the TestConnect Properties dialog box, select Internet Protocol Version 6 (TCP/IPv6).

Click Properties. > On the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box, select Advanced.

On the Advanced TCP/IP Settings dialog box, deselect Use default gateway on remote network.

Click OK. > Click OK on the Internet Protocol Version 6 (TCP/IPv6) Properties dialog box. > On the TestConnect Properties window, click OK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN server?

A

A VPN Server is a server with VPN software installed that can be used by the end-users device to establish a connection. The purpose of this server is to provide VPN services, such as encrypting and encapsulating the data packets. Once packaged, the packets will be securely delivered over the Internet to the intended destination. In theory, VPN Servers can handle about 4,000 connections. But when many connections are being used, the server’s response will be slow. Large organizations may want to consider additional VPN Servers in a Clustering and Load Balancing style management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IPSEC on VPN Protocols?

A

This protocol secures messages by encrypting and authenticating them. Transport and Tunnelling Mode are the two functionalities that IPSEC offers. In Transport mode, encrypting and concealing the data is performed. The Tunnelling Protocol is responsible for securing data while it is being transported across the Internet to its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is L2TP?

A

This VPN protocol is not secure and needs to be paired with a security protocol like IPSEC, which will function at 256-bit encryption. L2TP will create the tunnel and connection between the two points using a Point-to-Point protocol, allowing networking equipment to communicate securely. It is reliable, robust, adaptable, and broadly compatible and can handle most types of data. A downside is that it functions at lower speeds than other VPN technologies. It is very commonly used for network-to-network connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PPTP?

A

This VPN technology is one of the original VPN options available and is based on the Point-to-Point Protocol. PPTP has built-in encryption and authentication, but it is not to the level of some of today’s other standards at only 128-bit encryption. This protocol is faster than L2TP. Although it can be used on the Internet, this protocol will likely be used inside an organization to secure traffic on the Local Area Network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SSL and TLS?

A

On the Internet, SSL and TLS are used to offer security and are a main component in the Public Key Infrastructure. Originally, data was transmitted on the Internet in plain text. Higher security levels were required after the emergence of the World Wide Web. People were now shopping and banking online as well as other tasks. SSL was created in 1995 by Netscape to help solve the problem with encryption and authentication. SSL is no longer supported and ended at version 3.0.

An update to SSL was needed. The Internet Engineering Task Force developed TLS 1.0 based on SSL 3.0 in 1999. The current version of TLS is version 1.3. The terms are used almost interchangeably in the industry, but there are slight differences. SSL is more complex; hence the cost of network and PC resources can be high. TLS uses new stronger ciphers when compared to SSL. TLS will provide alerts when there are bad certificates. The way the hashes are communicated for authentication is done differently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is OpenVPN?

A

OpenVPN is an open-source VPN. This protocol has a variety of ways to allow connections and authentication. It can be used for peer-to-peer use with pre-shared keys or multiple users authenticating with certificates. It uses the ciphers available in the SSL Library. It is compatible with all common operating systems today and is a very secure, very commonly used protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is Third-party VPN Services?

A

There are 3rd party companies that provide VPN services. Some for free with limited features and severs. Others are available with a monthly subscription fee, unlocking more features and servers. You can have features such as hiding Internet traffic, obscure locations and help to bypass firewalls.

When choosing a personal VPN, you should consider the number of servers required, the location relative to your location and the number of connections allowed. Some commonly known VPN services include Express VPN, NordVPN, Surfshark, Proton VPN, Private Internet Access, and Ivacy. Each one will be slightly different with its own application interface but will generally function the same.

17
Q

What are the Third-Party Tools for Remote Access?

A

There are several built-in tools as part of the operating system, but many third-party vendors also provide remote access applications. Some of these applications can often have additional features and capabilities compared to the built-in tools. The features are usually available for a cost.

These are used:

Remote Monitoring and Management

Screen Sharing Software

Video Conferencing Software

File Transfer Software

Desktop Management Software

18
Q

Why do we use Remote Monitoring Management?

A

Remote Monitoring and Management technology is all about making life more efficient for the administrators. Using monitoring and management software, administrators connect to a centralized application to access statistics and information on networks and hosts. This technology simplifies the management of updates and patches, troubleshooting malfunctioning equipment, setting up new devices to the network, and monitoring service quality.

19
Q

Why do we use for SNMP?

A

The Simple Network Management Protocol (SNMP) is used. This application layer protocol uses SNMP managers, SNMP agents, and Management Information Bases to monitor and report back to the administrator about the state of the equipment. The SNMP Manager is used by the administrator for monitoring. SNMP Agents are pieces of software installed on different devices on the network that report back to the SNMP with statistics and information about what is going on with them. The Management Information Base is a log of all the devices being managed by SNMP.

20
Q

What is screen sharing software?

A

The screen sharing software allows users to share their screens with co-workers for project creation, to help users, or for productivity. Whatever the use, screen sharing has made remote work much more possible. There are many different providers of enterprise-level screen sharing software, and many of them provide free versions. The following are some examples of screen sharing applications: Cisco Webex Meetings, Google Hangouts, Skype, UberConference, VNC Connect, and Whereby.

21
Q

What is Video Conferencing Software?

A

The video conferencing software allows people to establish a connection using live video and audio to simulate the sense of being together in person. This can be utilized for personal reasons as well as to have meetings and even conferences online. The following are some examples of video conferencing software: Skype, Zoho Meeting, and Zoom Meetings.

22
Q

What is used for File Transfer Software?

A

The file transfer software handles file transfers over a network from one user to another or from a server to another user. File Transfer Protocol can be used. Several third-party apps have also been developed to compensate for FTP’s lack of security. Examples of file transfer software are Dropbox, Google Drive, Microsoft Teams and Smartsheet.

23
Q

Desktop Management software?

A

The desktop management software allows administrators the ability to control all the different computing devices in the organization, from servers all the way down to mobile devices. Some common uses include managing virtual desktops, application control, device management, OS deployment, patch management, PC imaging, manage licensing and certificates, data loss prevention, remote wipe mobile devices, and restrict other user features. Some examples are Desktop Management SoftwareConnectwise, Desktop Central, and Symantec Client Management Suite.

Microsoft Endpoint Manager