Use Remote Access Technologies Flashcards

lesson 19A (33 cards)

1
Q
A

Remote Desktop Connection client (mstsc.exe).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Configuring Remote Desktop server settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Using Remote Assistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

Confirming the SSH server’s host key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Remote desktop

A

enables users to work on a different computer over a network by running a terminal server, often used for remote work or IT troubleshooting via VPN access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remote access security

A

requires least privilege permissions, encrypted connections, secure server authentication, and vulnerability management, especially for internet-exposed ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remote Desktop Protocol (RDP)

A

In windows, for terminal server and client functionality. To connect, open Remote Desktop Connection or run mstsc.exe, enter the server’s IP address or FQDN, and verify the certificate for security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To authenticate on an RDP session

A

use Domain\Username for domain accounts or .\Username/Host\Username for local accounts. RDP encryption ensures credentials and session data remain secure from network interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RDP

The mstsc client is available

A

for Linux, macOS, iOS, and Android, enabling devices on these platforms to establish RDP connections to Windows servers for remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virtual Network Computing (VNC)

A

is an alternative to RDP for remote access. macOS uses Screen Sharing, which relies on VNC and allows connections via any VNC client. VNC operates over TCP port 5900, but not all versions support secure connections—macOS Screen Sharing ensures encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Remote Desktop servers

A

require access control, Network Level Authentication (NLA) for security, Restricted Admin Mode to protect credentials, and can run on TCP port 3389, with open-source alternatives like XRDP for Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Microsoft Remote Assistance (MSRA)

A

allows users to request help via an invitation file, while Quick Assist (CTRL+START+Q) offers an alternative using TCP/443 with encryption, requiring a Microsoft account for secure access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Secure Shell (SSH)

A

enables remote command-line access using TCP port 22 and encryption. Servers authenticate via a public/private key pair and host key fingerprint to prevent on-path attacks. Key management can be handled manually or with enterprise tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SSH host key pair

A

SSH uses a host key pair to establish encryption, with authentication via password or public key, ensuring secure remote access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Network visibility

A

ensures authorized hosts operate securely, relying on remote monitoring and management tools rather than manual inspections. These technologies help technicians oversee configurations and detect anomalies across the network efficiently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

**Remote monitoring and management (RMM)

A

tools** help managed service providers (MSPs) oversee client IT systems, track activity, and report billable support efficiently.

17
Q

Desktop management

A

including Unified Endpoint Management (UEM) and Mobile Device Management (MDM) suites, helps organizations enforce access control and authorization for secure device administration. Let me know if you want to explore their features further!

18
Q

locally installed agent

A

gathers status, log, and inventory data for a management server, integrating with help desk systems. Most suites support Windows, Linux, macOS, iOS, and Android devices for comprehensive oversight.

19
Q

agent with Endpoint Detection and Response (EDR) capabilities

A

enhances security by scanning for threats, detecting anomalies, and responding to potential breaches. It helps organizations proactively identify, isolate, and mitigate security risks across managed endpoints.

20
Q

Automated push deployment

A

streamlines upgrades, updates, security definitions, app installations, and script execution while ensuring license compliance across managed devices.

21
Q

Wake on LAN (WOL)

A

enables remote network boot functionality, allowing administrators to power on devices remotely. Advanced management tools can also facilitate system firmware access, firmware updates, and OS installations for streamlined maintenance and deployment.

22
Q

Access control enforcement

A

ensures that devices failing OS version, update, or health policy compliance are prevented from connecting to the network, reducing security risks and unauthorized access.

23
Q

Remote management suites

A

often include live chat, remote desktop, and remote shell access, enabling technicians to interact with users and directly troubleshoot systems without physical access.

24
Q

software agent

A

requires the OS to be active for communication with the management server, but out-of-band (OOB) management via Intel vPro or AMD PRO allows remote power control and system access even when the OS is offline.

25
**alternative remote access tools**
For smaller environments like SOHO networks, **alternative remote access tools** can provide cost-effective solutions for managing **non-Windows devices**. These protocols and software options help administrators maintain network oversight without the expense of enterprise monitoring suites.
26
Third-party **screen-sharing software**
like **TeamViewer** and **LogMeIn** provides remote control functionality over **HTTPS (TCP/443)**, ensuring encryption while avoiding complex firewall configurations. Some require local installation, while others run non-persistently. Users grant access using a **PIN code**, but organizations should enforce **out-of-band verification** to prevent social engineering attacks.
27
Video-conferencing software
like **Microsoft Teams** and **Zoom** offer **screen-sharing**, allowing users to share a **window or entire desktop**, with optional participant control for demonstrations and troubleshooting.
28
File transfer
software simplifies sharing files without requiring complex **network file share** configurations, ensuring compatibility across hosts and streamlining permissions.
29
AirDrop
available on **Apple iOS** and **macOS**, uses **Bluetooth** to initiate a **Wi-Fi Direct** connection for file transfers, ensuring security through **Bluetooth pairing** and **Wi-Fi encryption**.
30
**Near Sharing**
introduced in **Windows 10 (1803)**, is **Microsoft’s equivalent of AirDrop**, allowing seamless file transfers between devices using **Wi-Fi and Bluetooth** without complex network configurations.
31
**Nearby Share**
designed for **Android devices**, enables **Bluetooth-powered file sharing**, allowing seamless transfers without requiring a direct internet connection.
32
**Virtual Private Network (VPN)**
creates a **tunneled connection** between a local computer and a remote network, enhancing security. Instead of exposing **remote desktop ports**, users can **establish a VPN first**, then connect via **Remote Desktop Protocol (RDP)**, reducing firewall vulnerabilities.
33