Remote Access Protocols & Services Flashcards

1
Q

(RAS) Remote Access Service is a technology that enables you to connect to a computer from a ______ ________, for example, from your home to your job.

A

remote, location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(RAS) It allows the services, which would be available on a remote network, to be accessed over a ____-__ __________.

A

dial, up, connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(RAS) RAS was originally developed by _________ and built into their _______ __ line of server software.

A

Microsoft, Windows, NT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(RAS) It works with major network protocols such as ___/__, _______, and ___/___.

A

TCP/IP, NetBIOS, IPX/SPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(SLIP) SLIP stands for ______ ____ ________ ________.

A

Serial, Line, Internet, Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(SLIP) This is a protocol for communication between ___ computers using a ______ __________, such as a typical phone line.

A

two, serial, connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(SLIP) But SLIP is rarely used anymore because it’s not a ______ ________.

A

secure, protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(SLIP) During a dial-up connection, it sends all data, including sensitive data like passwords, in _____ ____.

A

clear, text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(SLIP) So SLIP falls short because security is a _____ _____ in today’s world.

A

major, issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(SLIP) SLIP also does not provide any _____ ________ and is limited to using only the ___/__ ________.

A

Error, checking, TCP/IP Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(PPP) A better protocol was needed to address the Issues involving SLIP, and that protocol was _____-__-_____ ________.

A

Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(PPP) PPP stands for _____-__-_____ ________, and this is a standard remote access protocol that is used today.

A

Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(PPPoE) It works by encapsulating PPP frames in ________ ______.

A

Ethernet, frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(PPPoE) People who use this protocol have a ___, _________, or ________ connection to the Internet.

A

DSL, broadband, wireless,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(PPPoE) It’s also used for connecting multiple users on a local area network to a ______ ____, sharing a common device.

A

remote, site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(PPPoE) This protocol uses PPP over ________.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(PPTP) This is called Point-to-Point _________ Protocol, and this technology is used for creating _______ ______ ________ or VPNs.

A

Tunneling, virtual, private, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(PPTP) In fact, this is the _______ ________ associated with VPNs.
- This ensures that the transfer of data between one device to another is secure by creating a secure tunnel between the ___ ______.

A

default, protocol, two, points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(GRE) GRE or _______ _____ _____________ is a protocol that is used with Point-to-Point Tunneling Protocol in the creation of a ___ _______.

A

Generic, Route, Encapsulation, VPN, Network

20
Q

(GRE) GRE is what actually creates the tunnel in ____. It is used to encapsulate the ____ in a secure manner.

A

PPTP, data

21
Q

(VPN) A VPN is a _______ _______ _______.

A

Virtual, Private, Network

22
Q

(VPN) It’s a private network that uses a public network, such as the ________, to establish a ______ __________.

A

Internet, remote, connection

23
Q

(VPN) The data is _________ as it is sent and _________ when received.

A

encrypted, decrypted

24
Q

(VPN) It provides a dedicated link between ___ points over the ________.

A

two, internet

25
Q

(VPN concentrator) the way a VPN is created and managed is by using a VPN ____________.

A

Concentrator

26
Q

(VPN concentrator) A VPN concentrator is a device that creates the ___ __________ and manages the delivery of the messages between the VPN _________ and _______.

A

VPN, connections, computers, devices

27
Q

(VPN concentrator) also authenticates _____, encrypts and decrypts the data, and assigns ______ __ _________ to users.

A

users, tunnel, IP, addresses

28
Q

(VPN concentrator) VPN concentrators are not always needed to manage and create VPNs. They are mainly used in organizations that are going to use a lot of ___ __________ and need a device to handle the _____ _______ that VPNs create.

A

VPN, connections, heavy traffic

29
Q

(VPN concentrator) If an organization is only going to use a small number of VPN connections, they can just use the VPN software that is built into their ______ or ________, rather than using a VPN concentrator.

A

router, firewall

30
Q

(VPN Site-to-Site) there are three different types of VPN connections.

A

Site-to-site
Host-to-site
Host-to-host

31
Q

(VPN Site-to-Site) One type is called site-to-site, and this is when an organization has two offices in different ____________ _________ and they want those offices to be networked and share data with each other over the public Internet.

A

geographical, locations

32
Q

(VPN Site-to-Site) So they would just need to set up a site-to-site VPN connection, and the VPN will encrypt the data as it goes through the Internet and then _______ the data as it enters the organization’s _______ _______.

A

decrypt, private, network

33
Q

(VPN Site-to-Site) Creating a site-to-site VPN creates an alternative to an _______ ______ line at a much _______ cost.

A

Internet, leased, cheaper

34
Q

(VPN Host-to-Site) if you’re at home with your computer and you need to connect to your office at a different location so you can access files, then you would need to set up a ____-__-____ VPN connection.

A

host-to-site

35
Q

(VPN Host-to-Site) this type of connection doesn’t require any additional ________ on your end at home.

A

hardware

36
Q

(VPN Host-to-Site) To establish this type of connection, you would basically just need your computer’s operating system to connect to your ______ ___ ________.
- once the connection is made, then you can access your office’s network over the ________.

A

office’s, VPN, Hardware, internet

37
Q

(VPN Host-to-Site) So all the special VPN hardware would be on the office or site side of the __________ and not at your ____.

A

connection, home

38
Q

(VPN Host-to-Host) there is the host-to-host VPN connection, and this is simply when you want to establish a ___ __________ between two computers over the Internet.

A

VPN, connection

39
Q

(VPN Host-to-Host) This type doesn’t require any additional ___ ________ at either end.

A

VPN, Hardware

40
Q

(VPN Host-to-Host) It only requires ________ on each ________ to create a simple host-to-host VPN connection.

A

software, computer

41
Q

(PPP) It was developed to replace SLIP’s limitations in _______, _____ ________, and ________ _______.

A

security, error, checking, protocol, support

42
Q

(PPP) And like SLIP, this is a protocol that’s used for communication between ___ computers using a ______ __________, such as a typical phone line.

A

two, serial, connection

43
Q

(PPP) But unlike SLIP, this is a ______ ________.

A

secure, protocol

44
Q

(PPP) Most Internet service providers use this protocol for their customers who want to access the Internet using a ____-__ __________.

A

dial, up, connection

45
Q

(PPPoE) Point-to-Point Protocol over ________ is exactly what its name implies.

A

Ethernet