Deck 14: Remote Access

ملء الشاشة (f)
exit full mode
سؤال
Windows Server 2016 can be configured as a remote access server by installing which server role?

A)Routing and Remote Access
B)Remote Server Administration
C)Remote Assistance
D)Network Policy and Access Services
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Remote Desktop listens on which TCP port number?

A)3389
B)3450
C)3398
D)3938
سؤال
One problem with CHAP is that is easy to obtain credentials during authentication.
سؤال
As part of DirectAccess configuration, which of the following is also configured?

A)Remote Desktop Server
B)Virtual Private Network Server
C)Network Location Server
D)Remote Assistance Server
سؤال
DirectAccess relies on IPv6 for connectivity.
سؤال
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

A)Remote login
B)Remote access
C)Remote control
D)Remote manage
سؤال
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?

A).rda file
B).rdp file
C).rdc file
D).rds.file
سؤال
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

A)PPTP
B)L2TP
C)SSTP
D)IKEv2
سؤال
Which of the following is considered the oldest technology for remote access?

A)virtual private network
B)DirectAccess
C)dial-up networking
D)TCP/IP
سؤال
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

A)remote access
B)remote resource
C)remote control
D)remote admin
سؤال
Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access.
سؤال
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

A)Windows Firewall
B)Remote Desktop Authentication
C)Network Level Authentication
D)IPsec Authentication
سؤال
What technology behaves like an "always-on" VPN connection?

A)Remote Desktop
B)dial-up networking
C)DirectAccess
D)Remote Assistance
سؤال
IKEv2 requires the use of which of authentication protocol?

A)Password Authentication Protocol (PAP)
B)Challenge Handshake Protocol (CHAP)
C)Point-to-Point Protocol (PPP)
D)Extensible Authentication Protocol (EAP)
سؤال
Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.
سؤال
Public networks allow traveling users to obtain a remote network connection.
سؤال
Which VPN protocol uses IPsec to provide data encryption?

A)PPTP
B)L2TP
C)SSTP
D)PPP
سؤال
Which PowerShell cmdlet shows the connection status for DirectAccess?

A)Get-DAConnectionStatus
B)Get-DAClientExperience
C)Get-DANetworkLocationServer
D)Get-DAEntryPoint
سؤال
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

A)DirectAccess
B)DSL
C)VPN
D)data synchronization
سؤال
For domain-joined computers, what is the simplest way to configure VPN connections?

A)manually
B)Group Policy Preferences
C)CMAK
D)Windows PowerShell
سؤال
Explain how data synchronization is a valid solution when there is either no connectivity or poor connectivity to connect to a workplace network.
سؤال
What are the most common issues with using DirectAccess? What can be done to troubleshoot those issues?
سؤال
On the ______________________ tab in Remote Desktop Connection, you can configure server authentication settings and Remote Desktop Gateway (RD Gateway)settings.
سؤال
When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.
سؤال
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

A)Remote Control
B)Remote Access
C)Remote Desktop
D)Remote Assistance
سؤال
How do remote control technologies improve on remote access technologies? Explain how this occurs.
سؤال
Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.
سؤال
____________________ consists of a dedicated computer acting as a remote access server and clients connecting to that server.
سؤال
What three things can authentication for IPsec be based upon?
سؤال
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10?

A)File History
B)Work Folders
C)Sync Center
D)OneDrive
سؤال
Why is dial-up networking no longer the most common method used for remote access? Explain why it is more common for remote access to be done over a virtual private network.
سؤال
What can be configured within the Local Resources tab in Remote Desktop Connection?
سؤال
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

A)/admin
B)/public
C)/shadow
D)/control
سؤال
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

A)Local Resources tab
B)Display tab
C)General tab
D)Experience tab
سؤال
Using Office 365, you can synchronize files from libraries located in which of the following?

A)Windows Store
B)Remote Assistance
C)Offline Files
D)SharePoint Online
سؤال
What is the purpose of configuring an RD Gateway server in Remote Desktop?
سؤال
What are the benefits of using DirectAccess as a remote access solution?
سؤال
Windows 10 is configured for DirectAccess using ___________ which are created during the DirectAccess configuration process.
سؤال
What is the preferred method to configure clients to use Work Folders?

A)configure user object in Active Directory
B)automatic discovery
C)manually enter the Work Folders URL
D)configure through the System and Security applet
سؤال
What are some of the ways Remote Assistance can be initiated?
سؤال
What are some of the methods that can be used to configure clients for accessing Work Folders?
سؤال
Match between columns
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Work Folders
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote access
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
DirectAccess
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Remote Assistance
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Extensible Authentication Protocol (EAP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
virtual private network (VPN)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Point-to-Point Tunneling Protocol (PPTP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote control
سؤال
Match between columns
an older VPN protocol that authenticates based on user name and password
Work Folders
an older VPN protocol that authenticates based on user name and password
remote access
an older VPN protocol that authenticates based on user name and password
DirectAccess
an older VPN protocol that authenticates based on user name and password
Remote Assistance
an older VPN protocol that authenticates based on user name and password
Extensible Authentication Protocol (EAP)
an older VPN protocol that authenticates based on user name and password
virtual private network (VPN)
an older VPN protocol that authenticates based on user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an older VPN protocol that authenticates based on user name and password
Point-to-Point Tunneling Protocol (PPTP)
an older VPN protocol that authenticates based on user name and password
remote control
سؤال
Match between columns
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Work Folders
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote access
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
DirectAccess
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Remote Assistance
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Extensible Authentication Protocol (EAP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
virtual private network (VPN)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Point-to-Point Tunneling Protocol (PPTP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote control
سؤال
Match between columns
an encrypted connection from a client to a remote access server over a public network
Work Folders
an encrypted connection from a client to a remote access server over a public network
remote access
an encrypted connection from a client to a remote access server over a public network
DirectAccess
an encrypted connection from a client to a remote access server over a public network
Remote Assistance
an encrypted connection from a client to a remote access server over a public network
Extensible Authentication Protocol (EAP)
an encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
an encrypted connection from a client to a remote access server over a public network
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an encrypted connection from a client to a remote access server over a public network
Point-to-Point Tunneling Protocol (PPTP)
an encrypted connection from a client to a remote access server over a public network
remote control
سؤال
Match between columns
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Work Folders
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote access
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
DirectAccess
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Remote Assistance
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Extensible Authentication Protocol (EAP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
virtual private network (VPN)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Point-to-Point Tunneling Protocol (PPTP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote control
سؤال
Match between columns
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Work Folders
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote access
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
DirectAccess
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Extensible Authentication Protocol (EAP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
virtual private network (VPN)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Point-to-Point Tunneling Protocol (PPTP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote control
سؤال
Match between columns
an always-on replacement for on-demand VPN connections
Work Folders
an always-on replacement for on-demand VPN connections
remote access
an always-on replacement for on-demand VPN connections
DirectAccess
an always-on replacement for on-demand VPN connections
Remote Assistance
an always-on replacement for on-demand VPN connections
Extensible Authentication Protocol (EAP)
an always-on replacement for on-demand VPN connections
virtual private network (VPN)
an always-on replacement for on-demand VPN connections
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an always-on replacement for on-demand VPN connections
Point-to-Point Tunneling Protocol (PPTP)
an always-on replacement for on-demand VPN connections
remote control
سؤال
Match between columns
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Work Folders
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote access
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
DirectAccess
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Remote Assistance
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Extensible Authentication Protocol (EAP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
virtual private network (VPN)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Point-to-Point Tunneling Protocol (PPTP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote control
سؤال
Match between columns
a system that allows users to synchronize a single folder on a file server between multiple devices
Work Folders
a system that allows users to synchronize a single folder on a file server between multiple devices
remote access
a system that allows users to synchronize a single folder on a file server between multiple devices
DirectAccess
a system that allows users to synchronize a single folder on a file server between multiple devices
Remote Assistance
a system that allows users to synchronize a single folder on a file server between multiple devices
Extensible Authentication Protocol (EAP)
a system that allows users to synchronize a single folder on a file server between multiple devices
virtual private network (VPN)
a system that allows users to synchronize a single folder on a file server between multiple devices
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows users to synchronize a single folder on a file server between multiple devices
Point-to-Point Tunneling Protocol (PPTP)
a system that allows users to synchronize a single folder on a file server between multiple devices
remote control
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: Remote Access
1
Windows Server 2016 can be configured as a remote access server by installing which server role?

A)Routing and Remote Access
B)Remote Server Administration
C)Remote Assistance
D)Network Policy and Access Services
A
2
Remote Desktop listens on which TCP port number?

A)3389
B)3450
C)3398
D)3938
A
3
One problem with CHAP is that is easy to obtain credentials during authentication.
True
4
As part of DirectAccess configuration, which of the following is also configured?

A)Remote Desktop Server
B)Virtual Private Network Server
C)Network Location Server
D)Remote Assistance Server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
DirectAccess relies on IPv6 for connectivity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

A)Remote login
B)Remote access
C)Remote control
D)Remote manage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?

A).rda file
B).rdp file
C).rdc file
D).rds.file
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

A)PPTP
B)L2TP
C)SSTP
D)IKEv2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is considered the oldest technology for remote access?

A)virtual private network
B)DirectAccess
C)dial-up networking
D)TCP/IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

A)remote access
B)remote resource
C)remote control
D)remote admin
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

A)Windows Firewall
B)Remote Desktop Authentication
C)Network Level Authentication
D)IPsec Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What technology behaves like an "always-on" VPN connection?

A)Remote Desktop
B)dial-up networking
C)DirectAccess
D)Remote Assistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
IKEv2 requires the use of which of authentication protocol?

A)Password Authentication Protocol (PAP)
B)Challenge Handshake Protocol (CHAP)
C)Point-to-Point Protocol (PPP)
D)Extensible Authentication Protocol (EAP)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
Public networks allow traveling users to obtain a remote network connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which VPN protocol uses IPsec to provide data encryption?

A)PPTP
B)L2TP
C)SSTP
D)PPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which PowerShell cmdlet shows the connection status for DirectAccess?

A)Get-DAConnectionStatus
B)Get-DAClientExperience
C)Get-DANetworkLocationServer
D)Get-DAEntryPoint
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

A)DirectAccess
B)DSL
C)VPN
D)data synchronization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
For domain-joined computers, what is the simplest way to configure VPN connections?

A)manually
B)Group Policy Preferences
C)CMAK
D)Windows PowerShell
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
Explain how data synchronization is a valid solution when there is either no connectivity or poor connectivity to connect to a workplace network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
What are the most common issues with using DirectAccess? What can be done to troubleshoot those issues?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
On the ______________________ tab in Remote Desktop Connection, you can configure server authentication settings and Remote Desktop Gateway (RD Gateway)settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

A)Remote Control
B)Remote Access
C)Remote Desktop
D)Remote Assistance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
How do remote control technologies improve on remote access technologies? Explain how this occurs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
____________________ consists of a dedicated computer acting as a remote access server and clients connecting to that server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
What three things can authentication for IPsec be based upon?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10?

A)File History
B)Work Folders
C)Sync Center
D)OneDrive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Why is dial-up networking no longer the most common method used for remote access? Explain why it is more common for remote access to be done over a virtual private network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
What can be configured within the Local Resources tab in Remote Desktop Connection?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

A)/admin
B)/public
C)/shadow
D)/control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

A)Local Resources tab
B)Display tab
C)General tab
D)Experience tab
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
Using Office 365, you can synchronize files from libraries located in which of the following?

A)Windows Store
B)Remote Assistance
C)Offline Files
D)SharePoint Online
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is the purpose of configuring an RD Gateway server in Remote Desktop?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
What are the benefits of using DirectAccess as a remote access solution?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Windows 10 is configured for DirectAccess using ___________ which are created during the DirectAccess configuration process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is the preferred method to configure clients to use Work Folders?

A)configure user object in Active Directory
B)automatic discovery
C)manually enter the Work Folders URL
D)configure through the System and Security applet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
What are some of the ways Remote Assistance can be initiated?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
What are some of the methods that can be used to configure clients for accessing Work Folders?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Work Folders
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote access
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
DirectAccess
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Remote Assistance
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Extensible Authentication Protocol (EAP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
virtual private network (VPN)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Point-to-Point Tunneling Protocol (PPTP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
Match between columns
an older VPN protocol that authenticates based on user name and password
Work Folders
an older VPN protocol that authenticates based on user name and password
remote access
an older VPN protocol that authenticates based on user name and password
DirectAccess
an older VPN protocol that authenticates based on user name and password
Remote Assistance
an older VPN protocol that authenticates based on user name and password
Extensible Authentication Protocol (EAP)
an older VPN protocol that authenticates based on user name and password
virtual private network (VPN)
an older VPN protocol that authenticates based on user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an older VPN protocol that authenticates based on user name and password
Point-to-Point Tunneling Protocol (PPTP)
an older VPN protocol that authenticates based on user name and password
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Match between columns
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Work Folders
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote access
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
DirectAccess
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Remote Assistance
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Extensible Authentication Protocol (EAP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
virtual private network (VPN)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Point-to-Point Tunneling Protocol (PPTP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Match between columns
an encrypted connection from a client to a remote access server over a public network
Work Folders
an encrypted connection from a client to a remote access server over a public network
remote access
an encrypted connection from a client to a remote access server over a public network
DirectAccess
an encrypted connection from a client to a remote access server over a public network
Remote Assistance
an encrypted connection from a client to a remote access server over a public network
Extensible Authentication Protocol (EAP)
an encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
an encrypted connection from a client to a remote access server over a public network
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an encrypted connection from a client to a remote access server over a public network
Point-to-Point Tunneling Protocol (PPTP)
an encrypted connection from a client to a remote access server over a public network
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Match between columns
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Work Folders
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote access
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
DirectAccess
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Remote Assistance
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Extensible Authentication Protocol (EAP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
virtual private network (VPN)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Point-to-Point Tunneling Protocol (PPTP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match between columns
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Work Folders
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote access
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
DirectAccess
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Extensible Authentication Protocol (EAP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
virtual private network (VPN)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Point-to-Point Tunneling Protocol (PPTP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
Match between columns
an always-on replacement for on-demand VPN connections
Work Folders
an always-on replacement for on-demand VPN connections
remote access
an always-on replacement for on-demand VPN connections
DirectAccess
an always-on replacement for on-demand VPN connections
Remote Assistance
an always-on replacement for on-demand VPN connections
Extensible Authentication Protocol (EAP)
an always-on replacement for on-demand VPN connections
virtual private network (VPN)
an always-on replacement for on-demand VPN connections
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an always-on replacement for on-demand VPN connections
Point-to-Point Tunneling Protocol (PPTP)
an always-on replacement for on-demand VPN connections
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Match between columns
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Work Folders
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote access
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
DirectAccess
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Remote Assistance
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Extensible Authentication Protocol (EAP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
virtual private network (VPN)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Point-to-Point Tunneling Protocol (PPTP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Match between columns
a system that allows users to synchronize a single folder on a file server between multiple devices
Work Folders
a system that allows users to synchronize a single folder on a file server between multiple devices
remote access
a system that allows users to synchronize a single folder on a file server between multiple devices
DirectAccess
a system that allows users to synchronize a single folder on a file server between multiple devices
Remote Assistance
a system that allows users to synchronize a single folder on a file server between multiple devices
Extensible Authentication Protocol (EAP)
a system that allows users to synchronize a single folder on a file server between multiple devices
virtual private network (VPN)
a system that allows users to synchronize a single folder on a file server between multiple devices
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows users to synchronize a single folder on a file server between multiple devices
Point-to-Point Tunneling Protocol (PPTP)
a system that allows users to synchronize a single folder on a file server between multiple devices
remote control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.