Remote Access Methods Flashcards

1
Q

What type of VPN might feature the use of a clientless VPN solution?
a. Site-to-site
b. Client-to-site
c. Client-to-client
d. Server-to-server

A

Answer: b. The client-to-site VPN type often features the use of a client system and its web browser and SSL/TLS to make a VPN connection. This is
often considered “clientless” because the web browser is built in to the operating system, and there is no need for any separate client software installation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is often considered a multiplatform solution that is
similar to the approach taken by RDP?
a. VNC
b. SSH
c. Telnet
d. MDM

A

Answer: a. Virtual network computing (VNC) is a multiplatform solution for
remote desktop access. It is a very similar approach taken by Microsoft Remote
Desktop Protocol (RDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What remote access technology is considered a secure alternative to Telnet for
making a secure connection to a remote network device and operating at the
CLI?
a. SCP
b. SFTP
c. SSH
d. SSL

A

Answer: c. The Secure Shell (SSH) protocol is the secure replacement technology for Telnet. Unlike Telnet, SSH offers strong security mechanisms that
are in wide use today.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Sally has been issued a new corporate laptop. This laptop requires a fingerprint
followed by a pin code in order to access the desktop. What examples of MFA
are in use here? (Choose two.)
a. Something she is
b. Something she has
c. Something she knows
d. Somewhere she is

A

Answer: a, c In this example, Sally is using something she is (her fingerprint)
along with something that she knows (the pin code).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A user clicks Accept, views an advertisement, provides an email address, or performs some other required action, and the network grants access to the user.
Which of the following is being described here?
a. Virtual network computing (VNC)
b. Remote desktop connection (RDC)
c. SSH
d. Captive portal

A

Answer: d. Captive portals are common in public places such as airports and
coffee shops. The user simply clicks Accept, views an advertisement, provides an
email address, or performs some other required action, and the network then
grants access to the user and no longer holds the user captive to that portal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly