4.9 Remote Access Flashcards

(31 cards)

1
Q

What is remote access in IT?

A

The ability to access and manage a computer or network from a different location.

Remote access enables users to work from anywhere, enhancing flexibility and productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is remote access important for IT support?

A

It allows troubleshooting and administration without being physically present.

This capability is crucial for efficient IT management and quick problem resolution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the biggest risk with remote access technologies?

A

Security vulnerabilities that can be exploited by attackers or scammers.

Proper security measures are essential to mitigate these risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is RDP?

A

Remote Desktop Protocol, a Microsoft protocol for remote desktop access.

RDP allows users to connect to another computer over a network connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port does RDP use?

A

TCP port 3389.

This well-known port is often targeted by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is RDP a common attack target?

A

Because it uses a well-known port (3389) and is widely used.

Attackers often scan for open RDP ports to exploit vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is VNC?

A

Virtual Network Computing, an open-source remote desktop protocol.

VNC allows remote control of another computer’s desktop.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol does VNC use?

A

RFB (Remote Frame Buffer).

RFB is the underlying protocol that VNC uses for communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What security measure should be used for RDP and VNC?

A

Strong authentication (e.g., strong passwords, MFA).

Implementing strong authentication helps protect against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN?

A

A secure, encrypted connection over the internet to a private network.

VPNs are essential for protecting data transmitted over public networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a VPN concentrator do?

A

Encrypts and decrypts VPN traffic, often built into firewalls.

This device manages multiple VPN connections and ensures secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are VPNs important?

A

They protect data by encrypting remote connections.

VPNs are crucial for maintaining privacy and security online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SSH?

A

Secure Shell, an encrypted protocol for remote command-line access.

SSH is widely used for secure remote administration of servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What port does SSH use?

A

TCP port 22.

This port is the default for SSH connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What protocol does SSH replace?

A

Telnet.

Telnet is insecure as it transmits data in plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What port does Telnet use?

A

TCP port 23.

Telnet is often disabled on secure systems due to its vulnerabilities.

17
Q

Why is Telnet insecure?

A

It transmits data in plain text (no encryption).

This makes it susceptible to eavesdropping and attacks.

18
Q

What is a best practice for SSH security?

A

Disable root login.

This reduces the risk of unauthorized access to the system.

19
Q

Another SSH best practice?

A

Use public/private key authentication.

This method enhances security compared to password-based authentication.

20
Q

What is RMM?

A

Tools used to monitor and manage multiple systems remotely.

RMM tools are essential for IT service providers to maintain client systems.

21
Q

Who commonly uses RMM tools?

A

Managed Service Providers (MSPs).

MSPs rely on RMM for efficient system management and support.

22
Q

What can RMM tools do?

A
  • Patch systems
  • Monitor performance
  • Manage devices remotely

These capabilities help maintain system health and security.

23
Q

Why must RMM tools be highly secured?

A

They have access to many systems at once.

A breach could lead to widespread vulnerabilities across multiple clients.

24
Q

What security measure is critical for RMM?

A

Multi-factor authentication (MFA).

MFA adds an additional layer of security to remote management tools.

25
What is **Spice**?
A protocol for remote access to virtual desktops with efficient graphics. ## Footnote Spice enhances the user experience for remote desktop sessions.
26
What is **WinRM**?
Windows Remote Management for running scripts remotely. ## Footnote WinRM is a powerful tool for managing Windows systems.
27
Does **WinRM** require a GUI session?
No, it works without an interactive session. ## Footnote This allows for automation and remote management without needing a graphical interface.
28
Name examples of **third-party remote tools**.
* TeamViewer * Zoom * Cloud storage tools ## Footnote These tools facilitate remote support, meetings, and file sharing.
29
What are **third-party tools** used for?
Remote support, meetings, and file sharing. ## Footnote They provide additional functionalities beyond built-in remote access solutions.
30
What type of attack targets weak **remote access passwords**?
Brute-force attack. ## Footnote Attackers use automated tools to guess passwords, emphasizing the need for strong credentials.
31
What is a key principle for all **remote access tools**?
Always secure access with strong authentication and encryption. ## Footnote This principle is vital for protecting sensitive data and systems.