Exam 14: Remote Access
What three things can authentication for IPsec be based upon?
The authentication for IPsec can be based on:
* Pre-shared key-This is a password that needs to be configured on both the VPN client and the remote access server. A pre-shared key is relatively easy to implement, but, since a single password is shared by all clients and the remote access server, this is not very secure.
* Certificates-If the VPN client and the remote access server have both been configured with certificates that are trusted, then certificate authentication can be used. This is more secure than a pre-shared key, but it can be awkward to deploy certificates to all of the VPN clients.
* Kerberos-Windows-based networks use Kerberos to authenticate users and computers. This same protocol can be used by IPsec. Using IPsec is only possible if the VPN client computer and the remote access server are members of the same Active Directory forest.
Which of the following is considered the oldest technology for remote access?
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?
When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?
Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?
What are the benefits of using DirectAccess as a remote access solution?
IKEv2 requires the use of which of authentication protocol?
For domain-joined computers, what is the simplest way to configure VPN connections?
What is the purpose of configuring an RD Gateway server in Remote Desktop?
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)