Remote Access Protocols & Services Flashcards

1
Q

(RAS) Remote Access Service is a technology that enables you to connect to a computer from a ______ ________, for example, from your home to your job.

A

remote, location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(RAS) It allows the services, which would be available on a remote network, to be accessed over a ____-__ __________.

A

dial, up, connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(RAS) RAS was originally developed by _________ and built into their _______ __ line of server software.

A

Microsoft, Windows, NT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(RAS) It works with major network protocols such as ___/__, _______, and ___/___.

A

TCP/IP, NetBIOS, IPX/SPX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(SLIP) SLIP stands for ______ ____ ________ ________.

A

Serial, Line, Internet, Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(SLIP) This is a protocol for communication between ___ computers using a ______ __________, such as a typical phone line.

A

two, serial, connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(SLIP) But SLIP is rarely used anymore because it’s not a ______ ________.

A

secure, protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(SLIP) During a dial-up connection, it sends all data, including sensitive data like passwords, in _____ ____.

A

clear, text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(SLIP) So SLIP falls short because security is a _____ _____ in today’s world.

A

major, issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(SLIP) SLIP also does not provide any _____ ________ and is limited to using only the ___/__ ________.

A

Error, checking, TCP/IP Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(PPP) A better protocol was needed to address the Issues involving SLIP, and that protocol was _____-__-_____ ________.

A

Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(PPP) PPP stands for _____-__-_____ ________, and this is a standard remote access protocol that is used today.

A

Point-to-Point Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(PPPoE) It works by encapsulating PPP frames in ________ ______.

A

Ethernet, frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(PPPoE) People who use this protocol have a ___, _________, or ________ connection to the Internet.

A

DSL, broadband, wireless,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(PPPoE) It’s also used for connecting multiple users on a local area network to a ______ ____, sharing a common device.

A

remote, site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(PPPoE) This protocol uses PPP over ________.

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(PPTP) This is called Point-to-Point _________ Protocol, and this technology is used for creating _______ ______ ________ or VPNs.

A

Tunneling, virtual, private, networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(PPTP) In fact, this is the _______ ________ associated with VPNs.
- This ensures that the transfer of data between one device to another is secure by creating a secure tunnel between the ___ ______.

A

default, protocol, two, points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(GRE) GRE or _______ _____ _____________ is a protocol that is used with Point-to-Point Tunneling Protocol in the creation of a ___ _______.

A

Generic, Route, Encapsulation, VPN, Network

20
Q

(GRE) GRE is what actually creates the tunnel in ____. It is used to encapsulate the ____ in a secure manner.

A

PPTP, data

21
Q

(VPN) A VPN is a _______ _______ _______.

A

Virtual, Private, Network

22
Q

(VPN) It’s a private network that uses a public network, such as the ________, to establish a ______ __________.

A

Internet, remote, connection

23
Q

(VPN) The data is _________ as it is sent and _________ when received.

A

encrypted, decrypted

24
Q

(VPN) It provides a dedicated link between ___ points over the ________.

A

two, internet

25
(VPN concentrator) the way a VPN is created and managed is by using a VPN ____________.
Concentrator
26
(VPN concentrator) A VPN concentrator is a device that creates the ___ __________ and manages the delivery of the messages between the VPN _________ and _______.
VPN, connections, computers, devices
27
(VPN concentrator) also authenticates _____, encrypts and decrypts the data, and assigns ______ __ _________ to users.
users, tunnel, IP, addresses
28
(VPN concentrator) VPN concentrators are not always needed to manage and create VPNs. They are mainly used in organizations that are going to use a lot of ___ __________ and need a device to handle the _____ _______ that VPNs create.
VPN, connections, heavy traffic
29
(VPN concentrator) If an organization is only going to use a small number of VPN connections, they can just use the VPN software that is built into their ______ or ________, rather than using a VPN concentrator.
router, firewall
30
(VPN Site-to-Site) there are three different types of VPN connections.
Site-to-site Host-to-site Host-to-host
31
(VPN Site-to-Site) One type is called site-to-site, and this is when an organization has two offices in different ____________ _________ and they want those offices to be networked and share data with each other over the public Internet.
geographical, locations
32
(VPN Site-to-Site) So they would just need to set up a site-to-site VPN connection, and the VPN will encrypt the data as it goes through the Internet and then _______ the data as it enters the organization's _______ _______.
decrypt, private, network
33
(VPN Site-to-Site) Creating a site-to-site VPN creates an alternative to an _______ ______ line at a much _______ cost.
Internet, leased, cheaper
34
(VPN Host-to-Site) if you're at home with your computer and you need to connect to your office at a different location so you can access files, then you would need to set up a ____-__-____ VPN connection.
host-to-site
35
(VPN Host-to-Site) this type of connection doesn't require any additional ________ on your end at home.
hardware
36
(VPN Host-to-Site) To establish this type of connection, you would basically just need your computer's operating system to connect to your ______ ___ ________. - once the connection is made, then you can access your office's network over the ________.
office's, VPN, Hardware, internet
37
(VPN Host-to-Site) So all the special VPN hardware would be on the office or site side of the __________ and not at your ____.
connection, home
38
(VPN Host-to-Host) there is the host-to-host VPN connection, and this is simply when you want to establish a ___ __________ between two computers over the Internet.
VPN, connection
39
(VPN Host-to-Host) This type doesn't require any additional ___ ________ at either end.
VPN, Hardware
40
(VPN Host-to-Host) It only requires ________ on each ________ to create a simple host-to-host VPN connection.
software, computer
41
(PPP) It was developed to replace SLIP's limitations in _______, _____ ________, and ________ _______.
security, error, checking, protocol, support
42
(PPP) And like SLIP, this is a protocol that's used for communication between ___ computers using a ______ __________, such as a typical phone line.
two, serial, connection
43
(PPP) But unlike SLIP, this is a ______ ________.
secure, protocol
44
(PPP) Most Internet service providers use this protocol for their customers who want to access the Internet using a ____-__ __________.
dial, up, connection
45
(PPPoE) Point-to-Point Protocol over ________ is exactly what its name implies.
Ethernet