FLASH CARDS

4.13 Use remote access technologies

  • What is the purpose of remote desktop software?

  • To allow a user to access and control a remote computer’s desktop.

  • What protocol does Windows use for remote desktop functionality?

  • Remote Desktop Protocol (RDP).

  • What is a key security feature of RDP?

  • Encryption of authentication and session data to prevent unauthorized access.

  • What is a limitation of RDP in multi-user environments?

  • Only one user can be signed in at a time; starting an RDP session locks the local desktop.

  • How do users connect to a Windows RDP server?

  • Open the Remote Desktop Connection shortcut or run mstsc.exe and enter the server's IP address or FQDN.

  • What additional security setting protects RDP from denial of service attacks?

  • Network Level Authentication (NLA).

  • What is the purpose of NLA in RDP?

  • To authenticate users before committing resources to their session, protecting against DoS attacks.

  • Why should RDP be configured for least privilege?

  • To limit access to only necessary users and minimize security risks.

  • What protocol does macOS use for remote desktop functionality?

  • Virtual Network Computing (VNC).

  • How does VNC compare to RDP?

  • VNC is similar but typically used on non-Windows systems like macOS, working over TCP port 5900.

  • What is SSH, and what does it connect to?

  • Secure Shell (SSH) connects users to a command-line interface rather than a desktop.

  • Which port does SSH use by default?

  • TCP port 22.

  • How does SSH ensure secure communication?

  • It uses a host key fingerprint to verify server authenticity and encrypts the session.

  • Which port does RDP use by default?

  • TCP port 3389.

  • How do you change the Remote Desktop access settings on Windows?

  • Open the Remote Desktop page in the Settings app or System Properties.

  • How do you add specific users to access a Remote Desktop server?

  • Use the Select Users option to specify allowed accounts; local admins have access by default.

  • What is RDP Restricted Admin (RDPRA) Mode?

  • A security feature that reduces exposure of credentials when connecting to a potentially compromised server.

  • What is Microsoft Remote Assistance (MSRA)?

  • A feature that allows users to request help via an invitation file protected by a passcode.

  • How does Quick Assist differ from MSRA?

  • Quick Assist uses HTTPS (port 443) for secure remote help, while MSRA assigns ports dynamically.

  • What limitation do both MSRA and Quick Assist have regarding User Account Control (UAC)?

  • Neither allows helpers to perform tasks that require UAC consent without lowering UAC settings.

  • Name two third-party screen-sharing tools.

  • TeamViewer and LogMeIn.

  • How do screen-sharing tools like TeamViewer enhance security?

  • They use encrypted HTTPS connections and typically require a PIN code for session access.

  • How can users securely transfer files on Apple devices?

  • Using AirDrop, which creates a secure Wi-Fi Direct connection for file sharing.

  • What file-sharing feature is built into Windows?

  • Nearby Sharing, which works similarly to AirDrop.

  • What is Nearby Share on Android devices?

  • A Bluetooth-enabled feature for secure file sharing.

  • How does a VPN secure remote connections?

  • By establishing a secure, encrypted tunnel between the local device and a remote network.

  • Why would you use a VPN with remote desktop software?

  • To add an extra security layer, avoiding the need to open additional firewall ports.

  • What are Remote Monitoring and Management (RMM) tools used for?

  • To enable managed service providers (MSPs) to monitor and manage client IT environments.

  • What functionality do Unified Endpoint Management (UEM) suites typically include?

  • Access control, inventory, updates, and remote desktop capabilities for organizational IT.

  • What is an advantage of using an RMM tool?

  • It provides reporting and billing features for managed service providers.

  • How do UEM tools improve network security?

  • By enforcing health policies and restricting access to non-compliant devices.