Remote Access Flashcards

4.3.2

1
Q

Types of remote access

A

Service specific
Remote control
Remote node operation
Screen scraping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Service Specific

A

Give users the ability to remotely connect to and manipulate or interact with a single service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Remote Control

A

grants a remote user the ability to fully control another system that is physically distant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Remote Node Operation

A

Remote client connecting directly to a LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Screen Scraping

A

Remote control, remote access or remote desktop services
Technology that allows an automated tool to interact with human interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote Access Security Management

A

Strong Authentication System
Limit Remote access to only those who need it
Implement encryption across transmission link via VPN, SSL, TLS, SSH, or IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virtual Private Network (VPN)

A

communication tunnel that establishes a secure point to point connection over an untrusted network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Common VPN protocols

A

Point to Point Tunneling (PPTP): data link layer used on IP networks
Layer 2 Tunneling Protocol (LPTP): Data Link layer used on any LAN protocol
IPSec: Network Layer used on IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Point to Point Tunneling Protocol

A

Encapsulates Point to Point Protocol (PPP)traffic at the data link layer and is used on IP networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Supported PPTP Protocols

A

Microsoft Challenge Handshake Authentication Protocol (MS-CHAP)
CHAP
PAP
EAP
Shiva Password Authentication Protocol (SPAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 2 Tunneling Protocol (L2TP)

A

derived to create a point to point tunnel to connect disparate networks. Doesn’t employ encryption or strong authentication but in conjunction with IPSec it is possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly