Lesson 10 - Using Support and Scripting Tools Flashcards
(41 cards)
What is VNC?
Virtual Network Computing is a remote access tool and protocol. VNC is the basis of macOS screen-sharing.
What is the default TCP port for a Remote Desktop server?
Port 3389
What is MSRA?
Microsoft Remote Assistance is a Windows remote-support feature allowing a user to invite a technical support professional to provide assistance over a network using chat. The user can also grant the support professional control over his or her desktop. Remote Assistance uses the same RDP protocol as Remote Desktop
What is the Windows feature Quick Assist?
Quick Assist is a Windows support feature allowing remote screen-sharing over the internet. Replaces MSRA and can be accessed by (CTRL+START+Q). Quick Assist works over the encrypted HTTPS port TCP/443.
What is SSH?
Secure Shell is an application protocol supporting secure tunneling and remote terminal emulation and file copy. SSH runs over TCP port 22. SSH uses encryption to protect each session.
What are the two general classes of tools that provide enterprise monitoring and remote access?
-Remote monitoring and management (RMM)
-Desktop management or unified endpoint management (UEM)/mobile-device management (MDM)
You are updating a procedure that lists security considerations for remote access technologies. One of the precautions is to check that remote access ports have not been opened on the firewall without authorization. Which default port for VNC needs to be monitored?
Virtual Network Computing (VNC) uses TCP port 5900 by default.
True or false? You can configure a web server running on Linux to accept remote terminal connections from clients without using passwords.
True. This can be configured using public key authentication with the Secure Shell (SSH) protocol. The server can be installed with the public keys of authorized users.
You are joining a new startup business that will perform outsourced IT management for client firms. You have been asked to identify an appropriate software solution for off-site support and to ensure that service level agreement (SLA) metrics for downtime incidents are adhered to. What general class of remote access technology will be most suitable?
Remote monitoring and management (RMM) tools are principally designed for use by managed service providers (MSPs). As well as remote access and monitoring, this class of tools supports management of multiple client accounts and billing/reporting.
Users working from home need to be able to access a PC on the corporate network via RDP. What technology will enable this without having to open the RDP port to Internet access?
Configure a virtual private network (VPN) so that remote users can connect to the corporate LAN and then launch the remote desktop protocol (RDP) client to connect to the office PC.
What are the two main factors that govern backup operations?
-Frequency (period between backup jobs)
-Retention (period that any given backup job is kept for)
What is a backup chain?
A backup chain is a sequence of jobs starting with a full backup and followed by either incremental or differential backups to implement a media rotation scheme.
What are the three main types of backups?
- Full only: the backup job produces a file that contains all the data from the source
- Full with incremental: the chain starts with a full backup and then runs incremental jobs that select only new files and files modified since the previous job.
- Full with differential: the chain starts with a full backup and then runs differential jobs that select new files and files modified since the original full job.
What is a synthetic full backup?
A synthetic full backup is a job type that combines incremental backup jobs to synthesize a full backup job. Synthetic full backups have the advantage of being easy to restore from while also being easy on bandwidth across the network as only changes are transmitted.
What is the GFS backup rotation scheme?
GFS: Grandfather-father-son is a backup rotation scheme that labels tapes/devices used for backup jobs in generations, with the youngest generation having a shorter retention period than the oldest.
What is the 3-2-1 backup rule?
Backup best practice states that at any given time there should be at least three copies of data stored on two media types, with one copy held off site.
What backup issue does the synthetic job type address?
A synthetic full backup reduces data transfer requirements and, therefore, backup job time by synthesizing a full backup from previous incremental backups rather than directly from the source data.
You are documenting workstation backup and recovery methods and want to include the 3-2-1 backup rule. What is this rule?
It states that you should have three copies of your data across two media types, with one copy held offline and off site. The production data counts as one copy.
For which backup/restore issue is a cloud-based backup service an effective solution?
The issue of provisioning an off-site copy of a backup. Cloud storage can also provide extra capacity.
What frequent tests should you perform to ensure the integrity of backup settings and media?
You can perform a test restore and validate the files. You can run an integrity check on the media by using, for example, chkdsk on a hard drive used for backup. Backup software can often be configured to perform an integrity check on each file during a backup operation. You can also perform an audit of files included in a backup against a list of source files to ensure that everything has been included.
What is regulated data?
Regulated data is info that has storage- and handling- compliance requirements defined by national and state legislation and/or industry regulations.
What is PII?
Personally identifiable information (PII) is data that can be used to identify, contact, or locate an individual or to impersonate them.
What is Personal Government-issued Information?
Personal Government-issued Information is issued to individuals by federal or state government is also PII