
Remote Access Methods
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1How does IPsec protect packet confidentiality and/or integrity?IPsec encrypts the only the IP header to provide confidentiality for both the source and destination IP address.IPsec supports a transport mode that encrypts the IP header to protect confidentiality and integrity.By itself, IPsec can’t protect the confidentiality and integrity of a packet.IPsec supports a tunnel mode that encrypts the entire IP packet to protect confidentiality and integrity.30s
- Q2IPsec was originally developed as part of which protocol?TCPIPv6IPv4TLSv1.230s
- Q3What protocol provides TLS over UDP?DTLSSSLTLSv1.2IPsec30s
- Q4When might a site-to-site VPN be used?To allow two traveling engineers to communicate with each otherTo provide a secure link between two or more geographically separated officesTo connect a web server to a database in a different subnetTo connect a traveling engineer to resources on the corporate network30s
- Q5How does a site-to-site VPN differ from a client-to-site VPN?A site-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A client-to-site VPN provides a secure connection between two subnets on a network.A site-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A client-to-site VPN allows remote workers to access resources on a corporate network.A site-to-site VPN provides a secure connection between two subnets on a network. A client-to-site VPN allows remote workers to access resources on a corporate network.A client-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A site-to-site VPN allows remote workers to access resources on a corporate network.30s
- Q6Which port does RDP use?UDP port 5900TCP port 5900UDP port 3389TCP port 338930s
- Q7What is the main purpose of Secure Shell (SSH) protocol?It is used for secure file transfer, remote administration, and secure file copy.It is used for remote desktop, secure file transfer, and secure file copy.It is used secure file transfer, system logging, and securely sending email.It is used for remote administration, system logging, and secure file copy.30s
- Q8How does Telnet compare with SSH?Both Telnet and SSH allow a client to issue terminal commands to a remote server. SSH provides a secure connection, while Telnet is insecure and vulnerable to packet sniffing, packet replay, and other attacks.Both Telnet and SSH allow a client to issue terminal commands to a remote server. Telnet’s minimal bandwidth requirements make it better suited than SSH for use in bandwidth-constrained environments.Both Telnet and SSH allow a client to issue terminal commands to a remote server. Telnet provides a secure connection, while SSH is insecure and vulnerable to packet sniffing, packet replay, and other attacks.Telnet provides clients the ability to interact with an emulated terminal and to issue commands to a remote server, while SSH provides graphical remote desktop functionality.30s
- Q9What functionality do management ports enable?Management ports enable browser-based and/or terminal-based configuration of a networking appliance.Management ports allow a modem to be connected to a network appliance so that it may be configured remotely.Management ports enable administrators to connect a laptop to a networking appliance to configure the device.Management ports allow provisioning of a management subnet to provide a secure enclave for executive leadership.30s
- Q10How does In-Band management compare to Out-of-Band management?Out-of-Band management is less secure than In-Band management and is impacted more if there is a network outage.In-Band management occurs on a communication channel that also is used for other communications on the network. Out-of-Band management uses a different physical connection to the network appliance to enable management.In-Band management is more expensive than Out-of-Band management.Out-of-Band management occurs on a communication channel that also is used for other communications on the network. In-Band management uses a different physical connection to the network appliance to enable management.30s
- Q11What might be implemented to improve the security of In-Band management?Using a management VLANUsing telnet to connect to the terminal-based management interfaceUsing HTTP to connect to the browser-based management interfaceUsing FTP to transfer configuration files30s
- Q12SFTP uses what port?TCP port 23TCP port 22TCP port 21TCP port 2030s
- Q13An administrator downloads configuration files to a router over User Datagram Protocol (UDP) port 69. The router can read and write the files but cannot browse the directory or delete files. What remote management method does this scenario demonstrate?TFTPSCPFTPSSFTP30s
- Q14What is the principal means of obtaining secure remote access to a Linux server?SSHVNCTelnetRemote Desktop Protocol30s
- Q15A network uses a Virtual Private Network (VPN) that requires a Remote Access Server (RAS) listening on port 443. An encrypted tunnel sends authentication credentials to a Remote Authentication Dial-In User Service (RADIUS) server for processing. What type of VPN does the network use?PPTPTLSIPsecDMVPN30s