19. Remote Access Security Flashcards

1
Q
  1. Integrated Lights-Out is an example of which of the following technologies?
    a. Captive Portal
    b. Out-of-band management
    c. Clientless VPN
    d. AAA
A

b. Out-of-band management refers to any method of managing the server that does not use the network. An example of this technology is Integrated Lights Out, ir iLO, a technology embedded into HP servers that allows for out-of-band management of the server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. The most effective way to control both authentication of remote users and the application of their permissions is to provision which of the following?
    a. Captive Portal
    b. AAA
    c. LDAP
    d. RDP
A

b The most effective way to control both the authentication of remote users and the application of their permissions is to provision an AAA server, which can be either RADIUS or TACACS+.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Which of the following is an operating system image delivered over the network at each startup?
    a. VNC
    b. Virtual desktop
    c. Remote desktop
    d. RDP
A

b. A virtual desktop requires less computing power, especially if the applications are also delivered virtually and those applications are running in a VM in the cloud rather than in the local desktop, eating up local resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Which of the following is not a component of Virtual Network Computing (VNC)?
    a. VNC server
    b. VNC client
    c. VNC desktop
    d. VNC protocol
A

c. VNC includes the following components:
1. VNC server: Software that runs on the machine, sharing its screen.
2. VNC client (or viewer): Software on the machine that is remotely receiving the shared screen.
3. VNC protocol (RDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. Which of the following is a network protocol that is designed as an alternative to command-based utilities such as Telnet?
    a. SSL
    b. SSH
    c. STP
    d. STFP
A

b. Secure Shell (SSH) creates a secure channel between devices and provides confidentiality and integrity of the data transmission. It uses public-key cryptography to authenticate the remote computer and allow the remote computer to authenticate the user if necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Which of the following allows you to tunnel directly to the remote server with no VPN?
    a. Split tunnel
    b. RDP Gateway
    c. Full tunnel
    d. VNC
A

b. You don’t need to use a VPN. Using the SSL channel, RDP Gateway can tunnel directly to the remote server to increase the security of RDS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Which of the following was formerly called Terminal Services Client?
    a. Virtual Desktop
    b. Remote Desktop Connection
    c. VNC
    d. RDP Gateway
A

b. Microsoft began calling all terminal services products Remote Desktop with Windows Server 2008 R2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Which of the following operates somewhat like Telnet, except instead of getting a command-line prompt as you do with Telnet, you get the actual graphical user interface (GUI) of the remote computer?
    a. RBAC
    b. SSH
    c. RDP
    d. SSL
A

c. Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft. It allows you to connect to another computer and run programs. RDP operates somewhat like Telnet, except, instead of getting a command-line prompt as you do with Telnet, you get the actual graphical user interface (GUI) of the remote computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Which of the following is not an example of a remote desktop connection?
    a. RDP
    b. LogMeIn
    c. GoToMyPC
    d. SSH
A

d. A remote desktop connection gives one access to the desktop. SSH does not do that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Split tunnel and full tunnel are examples of which type of VPN?
    a. Client-to-site
    b. Site-to-site
    c. RDP VPN
    d. Clientless VPN
A

a. When a client-to-site VPN is created, it is possible to do so in two ways, split tunnel and full tunnel. The difference is whether the user uses the VPN for connecting to the internet as well as connecting to the office.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly