Deck 14: Remote Access

Full screen (f)
exit full mode
Question
Windows Server 2016 can be configured as a remote access server by installing which server role?

A)Routing and Remote Access
B)Remote Server Administration
C)Remote Assistance
D)Network Policy and Access Services
Use Space or
up arrow
down arrow
to flip the card.
Question
Remote Desktop listens on which TCP port number?

A)3389
B)3450
C)3398
D)3938
Question
One problem with CHAP is that is easy to obtain credentials during authentication.
Question
As part of DirectAccess configuration, which of the following is also configured?

A)Remote Desktop Server
B)Virtual Private Network Server
C)Network Location Server
D)Remote Assistance Server
Question
DirectAccess relies on IPv6 for connectivity.
Question
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

A)Remote login
B)Remote access
C)Remote control
D)Remote manage
Question
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?

A).rda file
B).rdp file
C).rdc file
D).rds.file
Question
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

A)PPTP
B)L2TP
C)SSTP
D)IKEv2
Question
Which of the following is considered the oldest technology for remote access?

A)virtual private network
B)DirectAccess
C)dial-up networking
D)TCP/IP
Question
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

A)remote access
B)remote resource
C)remote control
D)remote admin
Question
Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access.
Question
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

A)Windows Firewall
B)Remote Desktop Authentication
C)Network Level Authentication
D)IPsec Authentication
Question
What technology behaves like an "always-on" VPN connection?

A)Remote Desktop
B)dial-up networking
C)DirectAccess
D)Remote Assistance
Question
IKEv2 requires the use of which of authentication protocol?

A)Password Authentication Protocol (PAP)
B)Challenge Handshake Protocol (CHAP)
C)Point-to-Point Protocol (PPP)
D)Extensible Authentication Protocol (EAP)
Question
Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.
Question
Public networks allow traveling users to obtain a remote network connection.
Question
Which VPN protocol uses IPsec to provide data encryption?

A)PPTP
B)L2TP
C)SSTP
D)PPP
Question
Which PowerShell cmdlet shows the connection status for DirectAccess?

A)Get-DAConnectionStatus
B)Get-DAClientExperience
C)Get-DANetworkLocationServer
D)Get-DAEntryPoint
Question
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

A)DirectAccess
B)DSL
C)VPN
D)data synchronization
Question
For domain-joined computers, what is the simplest way to configure VPN connections?

A)manually
B)Group Policy Preferences
C)CMAK
D)Windows PowerShell
Question
Explain how data synchronization is a valid solution when there is either no connectivity or poor connectivity to connect to a workplace network.
Question
What are the most common issues with using DirectAccess? What can be done to troubleshoot those issues?
Question
On the ______________________ tab in Remote Desktop Connection, you can configure server authentication settings and Remote Desktop Gateway (RD Gateway)settings.
Question
When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.
Question
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

A)Remote Control
B)Remote Access
C)Remote Desktop
D)Remote Assistance
Question
How do remote control technologies improve on remote access technologies? Explain how this occurs.
Question
Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.
Question
____________________ consists of a dedicated computer acting as a remote access server and clients connecting to that server.
Question
What three things can authentication for IPsec be based upon?
Question
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10?

A)File History
B)Work Folders
C)Sync Center
D)OneDrive
Question
Why is dial-up networking no longer the most common method used for remote access? Explain why it is more common for remote access to be done over a virtual private network.
Question
What can be configured within the Local Resources tab in Remote Desktop Connection?
Question
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

A)/admin
B)/public
C)/shadow
D)/control
Question
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

A)Local Resources tab
B)Display tab
C)General tab
D)Experience tab
Question
Using Office 365, you can synchronize files from libraries located in which of the following?

A)Windows Store
B)Remote Assistance
C)Offline Files
D)SharePoint Online
Question
What is the purpose of configuring an RD Gateway server in Remote Desktop?
Question
What are the benefits of using DirectAccess as a remote access solution?
Question
Windows 10 is configured for DirectAccess using ___________ which are created during the DirectAccess configuration process.
Question
What is the preferred method to configure clients to use Work Folders?

A)configure user object in Active Directory
B)automatic discovery
C)manually enter the Work Folders URL
D)configure through the System and Security applet
Question
What are some of the ways Remote Assistance can be initiated?
Question
What are some of the methods that can be used to configure clients for accessing Work Folders?
Question
Match between columns
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Work Folders
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote access
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
DirectAccess
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Remote Assistance
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Extensible Authentication Protocol (EAP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
virtual private network (VPN)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Point-to-Point Tunneling Protocol (PPTP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote control
Question
Match between columns
an older VPN protocol that authenticates based on user name and password
Work Folders
an older VPN protocol that authenticates based on user name and password
remote access
an older VPN protocol that authenticates based on user name and password
DirectAccess
an older VPN protocol that authenticates based on user name and password
Remote Assistance
an older VPN protocol that authenticates based on user name and password
Extensible Authentication Protocol (EAP)
an older VPN protocol that authenticates based on user name and password
virtual private network (VPN)
an older VPN protocol that authenticates based on user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an older VPN protocol that authenticates based on user name and password
Point-to-Point Tunneling Protocol (PPTP)
an older VPN protocol that authenticates based on user name and password
remote control
Question
Match between columns
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Work Folders
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote access
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
DirectAccess
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Remote Assistance
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Extensible Authentication Protocol (EAP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
virtual private network (VPN)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Point-to-Point Tunneling Protocol (PPTP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote control
Question
Match between columns
an encrypted connection from a client to a remote access server over a public network
Work Folders
an encrypted connection from a client to a remote access server over a public network
remote access
an encrypted connection from a client to a remote access server over a public network
DirectAccess
an encrypted connection from a client to a remote access server over a public network
Remote Assistance
an encrypted connection from a client to a remote access server over a public network
Extensible Authentication Protocol (EAP)
an encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
an encrypted connection from a client to a remote access server over a public network
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an encrypted connection from a client to a remote access server over a public network
Point-to-Point Tunneling Protocol (PPTP)
an encrypted connection from a client to a remote access server over a public network
remote control
Question
Match between columns
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Work Folders
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote access
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
DirectAccess
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Remote Assistance
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Extensible Authentication Protocol (EAP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
virtual private network (VPN)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Point-to-Point Tunneling Protocol (PPTP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote control
Question
Match between columns
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Work Folders
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote access
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
DirectAccess
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Extensible Authentication Protocol (EAP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
virtual private network (VPN)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Point-to-Point Tunneling Protocol (PPTP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote control
Question
Match between columns
an always-on replacement for on-demand VPN connections
Work Folders
an always-on replacement for on-demand VPN connections
remote access
an always-on replacement for on-demand VPN connections
DirectAccess
an always-on replacement for on-demand VPN connections
Remote Assistance
an always-on replacement for on-demand VPN connections
Extensible Authentication Protocol (EAP)
an always-on replacement for on-demand VPN connections
virtual private network (VPN)
an always-on replacement for on-demand VPN connections
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an always-on replacement for on-demand VPN connections
Point-to-Point Tunneling Protocol (PPTP)
an always-on replacement for on-demand VPN connections
remote control
Question
Match between columns
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Work Folders
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote access
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
DirectAccess
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Remote Assistance
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Extensible Authentication Protocol (EAP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
virtual private network (VPN)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Point-to-Point Tunneling Protocol (PPTP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote control
Question
Match between columns
a system that allows users to synchronize a single folder on a file server between multiple devices
Work Folders
a system that allows users to synchronize a single folder on a file server between multiple devices
remote access
a system that allows users to synchronize a single folder on a file server between multiple devices
DirectAccess
a system that allows users to synchronize a single folder on a file server between multiple devices
Remote Assistance
a system that allows users to synchronize a single folder on a file server between multiple devices
Extensible Authentication Protocol (EAP)
a system that allows users to synchronize a single folder on a file server between multiple devices
virtual private network (VPN)
a system that allows users to synchronize a single folder on a file server between multiple devices
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows users to synchronize a single folder on a file server between multiple devices
Point-to-Point Tunneling Protocol (PPTP)
a system that allows users to synchronize a single folder on a file server between multiple devices
remote control
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 14: Remote Access
1
Windows Server 2016 can be configured as a remote access server by installing which server role?

A)Routing and Remote Access
B)Remote Server Administration
C)Remote Assistance
D)Network Policy and Access Services
A
2
Remote Desktop listens on which TCP port number?

A)3389
B)3450
C)3398
D)3938
A
3
One problem with CHAP is that is easy to obtain credentials during authentication.
True
4
As part of DirectAccess configuration, which of the following is also configured?

A)Remote Desktop Server
B)Virtual Private Network Server
C)Network Location Server
D)Remote Assistance Server
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
DirectAccess relies on IPv6 for connectivity.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following allows clients to access resources local to the server as if the client was on the same network as the server?

A)Remote login
B)Remote access
C)Remote control
D)Remote manage
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
When a client connects to a RD Web Access server, what type of file is downloaded that includes all of the necessary configuration information for connecting to the desktop of RemoteApp?

A).rda file
B).rdp file
C).rdc file
D).rds.file
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
When a VPN connection loses connectivity due to a network interruption, which protocol can reconnect automatically once network connectivity is restored using a feature known as VPN Reconnect?

A)PPTP
B)L2TP
C)SSTP
D)IKEv2
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is considered the oldest technology for remote access?

A)virtual private network
B)DirectAccess
C)dial-up networking
D)TCP/IP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following software does the remote client use to send keyboard and mouse commands to the computer being remotely controlled?

A)remote access
B)remote resource
C)remote control
D)remote admin
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Windows 10 includes a Remote Desktop client, but not Remote Desktop Web access.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
What is used to prevent users to connecting to Remote Desktop until the connection is authenticated?

A)Windows Firewall
B)Remote Desktop Authentication
C)Network Level Authentication
D)IPsec Authentication
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What technology behaves like an "always-on" VPN connection?

A)Remote Desktop
B)dial-up networking
C)DirectAccess
D)Remote Assistance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
IKEv2 requires the use of which of authentication protocol?

A)Password Authentication Protocol (PAP)
B)Challenge Handshake Protocol (CHAP)
C)Point-to-Point Protocol (PPP)
D)Extensible Authentication Protocol (EAP)
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
Layer 2 Tunneling Protocol provides both authentication and data encryption for the VPN client and remote access server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
Public networks allow traveling users to obtain a remote network connection.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Which VPN protocol uses IPsec to provide data encryption?

A)PPTP
B)L2TP
C)SSTP
D)PPP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
Which PowerShell cmdlet shows the connection status for DirectAccess?

A)Get-DAConnectionStatus
B)Get-DAClientExperience
C)Get-DANetworkLocationServer
D)Get-DAEntryPoint
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What type of technology allows users to work with files whether they are connected to network or not by copying files locally to mobile computers?

A)DirectAccess
B)DSL
C)VPN
D)data synchronization
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
For domain-joined computers, what is the simplest way to configure VPN connections?

A)manually
B)Group Policy Preferences
C)CMAK
D)Windows PowerShell
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
Explain how data synchronization is a valid solution when there is either no connectivity or poor connectivity to connect to a workplace network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
What are the most common issues with using DirectAccess? What can be done to troubleshoot those issues?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
On the ______________________ tab in Remote Desktop Connection, you can configure server authentication settings and Remote Desktop Gateway (RD Gateway)settings.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
When you implement ____________________, each user is given a unique folder for file storage that can be synchronized across multiple devices.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following allows a user to send an invitation to a remote user that invites them to remotely connect to the local computer?

A)Remote Control
B)Remote Access
C)Remote Desktop
D)Remote Assistance
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
How do remote control technologies improve on remote access technologies? Explain how this occurs.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Windows Server 2016 can be configured as a remote access server by installing the ____________________ server role.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
____________________ consists of a dedicated computer acting as a remote access server and clients connecting to that server.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
What three things can authentication for IPsec be based upon?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
Which utility should be used to review any synchronization errors that might occur using the Offline files feature in Windows 10?

A)File History
B)Work Folders
C)Sync Center
D)OneDrive
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Why is dial-up networking no longer the most common method used for remote access? Explain why it is more common for remote access to be done over a virtual private network.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
What can be configured within the Local Resources tab in Remote Desktop Connection?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
You can start Remote Desktop Connection from a command prompt by running mstsc.exe. Which option can be used with this command to prevent Remote Desktop Connection from saving information to the local computer?

A)/admin
B)/public
C)/shadow
D)/control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
In Remote Desktop Connection, which tab allows you to enable and disable various display-related settings that can impact the amount of data sent between the local and remote computers?

A)Local Resources tab
B)Display tab
C)General tab
D)Experience tab
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
Using Office 365, you can synchronize files from libraries located in which of the following?

A)Windows Store
B)Remote Assistance
C)Offline Files
D)SharePoint Online
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
What is the purpose of configuring an RD Gateway server in Remote Desktop?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
What are the benefits of using DirectAccess as a remote access solution?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Windows 10 is configured for DirectAccess using ___________ which are created during the DirectAccess configuration process.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
What is the preferred method to configure clients to use Work Folders?

A)configure user object in Active Directory
B)automatic discovery
C)manually enter the Work Folders URL
D)configure through the System and Security applet
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
What are some of the ways Remote Assistance can be initiated?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
What are some of the methods that can be used to configure clients for accessing Work Folders?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Work Folders
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote access
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
DirectAccess
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Remote Assistance
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Extensible Authentication Protocol (EAP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
virtual private network (VPN)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
Point-to-Point Tunneling Protocol (PPTP)
a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
Match between columns
an older VPN protocol that authenticates based on user name and password
Work Folders
an older VPN protocol that authenticates based on user name and password
remote access
an older VPN protocol that authenticates based on user name and password
DirectAccess
an older VPN protocol that authenticates based on user name and password
Remote Assistance
an older VPN protocol that authenticates based on user name and password
Extensible Authentication Protocol (EAP)
an older VPN protocol that authenticates based on user name and password
virtual private network (VPN)
an older VPN protocol that authenticates based on user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an older VPN protocol that authenticates based on user name and password
Point-to-Point Tunneling Protocol (PPTP)
an older VPN protocol that authenticates based on user name and password
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Match between columns
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Work Folders
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote access
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
DirectAccess
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Remote Assistance
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Extensible Authentication Protocol (EAP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
virtual private network (VPN)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
Point-to-Point Tunneling Protocol (PPTP)
a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Match between columns
an encrypted connection from a client to a remote access server over a public network
Work Folders
an encrypted connection from a client to a remote access server over a public network
remote access
an encrypted connection from a client to a remote access server over a public network
DirectAccess
an encrypted connection from a client to a remote access server over a public network
Remote Assistance
an encrypted connection from a client to a remote access server over a public network
Extensible Authentication Protocol (EAP)
an encrypted connection from a client to a remote access server over a public network
virtual private network (VPN)
an encrypted connection from a client to a remote access server over a public network
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an encrypted connection from a client to a remote access server over a public network
Point-to-Point Tunneling Protocol (PPTP)
an encrypted connection from a client to a remote access server over a public network
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Match between columns
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Work Folders
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote access
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
DirectAccess
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Remote Assistance
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Extensible Authentication Protocol (EAP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
virtual private network (VPN)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
Point-to-Point Tunneling Protocol (PPTP)
a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match between columns
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Work Folders
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote access
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
DirectAccess
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Remote Assistance
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Extensible Authentication Protocol (EAP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
virtual private network (VPN)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
Point-to-Point Tunneling Protocol (PPTP)
a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
Match between columns
an always-on replacement for on-demand VPN connections
Work Folders
an always-on replacement for on-demand VPN connections
remote access
an always-on replacement for on-demand VPN connections
DirectAccess
an always-on replacement for on-demand VPN connections
Remote Assistance
an always-on replacement for on-demand VPN connections
Extensible Authentication Protocol (EAP)
an always-on replacement for on-demand VPN connections
virtual private network (VPN)
an always-on replacement for on-demand VPN connections
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
an always-on replacement for on-demand VPN connections
Point-to-Point Tunneling Protocol (PPTP)
an always-on replacement for on-demand VPN connections
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Match between columns
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Work Folders
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote access
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
DirectAccess
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Remote Assistance
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Extensible Authentication Protocol (EAP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
virtual private network (VPN)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
Point-to-Point Tunneling Protocol (PPTP)
a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Match between columns
a system that allows users to synchronize a single folder on a file server between multiple devices
Work Folders
a system that allows users to synchronize a single folder on a file server between multiple devices
remote access
a system that allows users to synchronize a single folder on a file server between multiple devices
DirectAccess
a system that allows users to synchronize a single folder on a file server between multiple devices
Remote Assistance
a system that allows users to synchronize a single folder on a file server between multiple devices
Extensible Authentication Protocol (EAP)
a system that allows users to synchronize a single folder on a file server between multiple devices
virtual private network (VPN)
a system that allows users to synchronize a single folder on a file server between multiple devices
Internet Key Exchange v2 Tunneling Protocol (IKEv2)
a system that allows users to synchronize a single folder on a file server between multiple devices
Point-to-Point Tunneling Protocol (PPTP)
a system that allows users to synchronize a single folder on a file server between multiple devices
remote control
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.