Remote Access Methods Flashcards
What type of VPN might feature the use of a clientless VPN solution?
a. Site-to-site
b. Client-to-site
c. Client-to-client
d. Server-to-server
Answer: b. The client-to-site VPN type often features the use of a client system and its web browser and SSL/TLS to make a VPN connection. This is
often considered “clientless” because the web browser is built in to the operating system, and there is no need for any separate client software installation.
Which of the following is often considered a multiplatform solution that is
similar to the approach taken by RDP?
a. VNC
b. SSH
c. Telnet
d. MDM
Answer: a. Virtual network computing (VNC) is a multiplatform solution for
remote desktop access. It is a very similar approach taken by Microsoft Remote
Desktop Protocol (RDP).
What remote access technology is considered a secure alternative to Telnet for
making a secure connection to a remote network device and operating at the
CLI?
a. SCP
b. SFTP
c. SSH
d. SSL
Answer: c. The Secure Shell (SSH) protocol is the secure replacement technology for Telnet. Unlike Telnet, SSH offers strong security mechanisms that
are in wide use today.
Sally has been issued a new corporate laptop. This laptop requires a fingerprint
followed by a pin code in order to access the desktop. What examples of MFA
are in use here? (Choose two.)
a. Something she is
b. Something she has
c. Something she knows
d. Somewhere she is
Answer: a, c In this example, Sally is using something she is (her fingerprint)
along with something that she knows (the pin code).
A user clicks Accept, views an advertisement, provides an email address, or performs some other required action, and the network grants access to the user.
Which of the following is being described here?
a. Virtual network computing (VNC)
b. Remote desktop connection (RDC)
c. SSH
d. Captive portal
Answer: d. Captive portals are common in public places such as airports and
coffee shops. The user simply clicks Accept, views an advertisement, provides an
email address, or performs some other required action, and the network then
grants access to the user and no longer holds the user captive to that portal.