placeholder image to represent content

Remote Access Methods

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
15 questions
Show answers
  • Q1
    How does IPsec protect packet confidentiality and/or integrity?
    IPsec encrypts the only the IP header to provide confidentiality for both the source and destination IP address.
    IPsec supports a transport mode that encrypts the IP header to protect confidentiality and integrity.
    By itself, IPsec can’t protect the confidentiality and integrity of a packet.
    IPsec supports a tunnel mode that encrypts the entire IP packet to protect confidentiality and integrity.
    30s
  • Q2
    IPsec was originally developed as part of which protocol?
    TCP
    IPv6
    IPv4
    TLSv1.2
    30s
  • Q3
    What protocol provides TLS over UDP?
    DTLS
    SSL
    TLSv1.2
    IPsec
    30s
  • Q4
    When might a site-to-site VPN be used?
    To allow two traveling engineers to communicate with each other
    To provide a secure link between two or more geographically separated offices
    To connect a web server to a database in a different subnet
    To connect a traveling engineer to resources on the corporate network
    30s
  • Q5
    How does a site-to-site VPN differ from a client-to-site VPN?
    A site-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A client-to-site VPN provides a secure connection between two subnets on a network.
    A site-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A client-to-site VPN allows remote workers to access resources on a corporate network.
    A site-to-site VPN provides a secure connection between two subnets on a network. A client-to-site VPN allows remote workers to access resources on a corporate network.
    A client-to-site VPN replaces the use of leased lines to provide a secure connection between two or more local networks. A site-to-site VPN allows remote workers to access resources on a corporate network.
    30s
  • Q6
    Which port does RDP use?
    UDP port 5900
    TCP port 5900
    UDP port 3389
    TCP port 3389
    30s
  • Q7
    What is the main purpose of Secure Shell (SSH) protocol?
    It is used for secure file transfer, remote administration, and secure file copy.
    It is used for remote desktop, secure file transfer, and secure file copy.
    It is used secure file transfer, system logging, and securely sending email.
    It is used for remote administration, system logging, and secure file copy.
    30s
  • Q8
    How does Telnet compare with SSH?
    Both Telnet and SSH allow a client to issue terminal commands to a remote server. SSH provides a secure connection, while Telnet is insecure and vulnerable to packet sniffing, packet replay, and other attacks.
    Both Telnet and SSH allow a client to issue terminal commands to a remote server. Telnet’s minimal bandwidth requirements make it better suited than SSH for use in bandwidth-constrained environments.
    Both Telnet and SSH allow a client to issue terminal commands to a remote server. Telnet provides a secure connection, while SSH is insecure and vulnerable to packet sniffing, packet replay, and other attacks.
    Telnet provides clients the ability to interact with an emulated terminal and to issue commands to a remote server, while SSH provides graphical remote desktop functionality.
    30s
  • Q9
    What functionality do management ports enable?
    Management ports enable browser-based and/or terminal-based configuration of a networking appliance.
    Management ports allow a modem to be connected to a network appliance so that it may be configured remotely.
    Management ports enable administrators to connect a laptop to a networking appliance to configure the device.
    Management ports allow provisioning of a management subnet to provide a secure enclave for executive leadership.
    30s
  • Q10
    How does In-Band management compare to Out-of-Band management?
    Out-of-Band management is less secure than In-Band management and is impacted more if there is a network outage.
    In-Band management occurs on a communication channel that also is used for other communications on the network. Out-of-Band management uses a different physical connection to the network appliance to enable management.
    In-Band management is more expensive than Out-of-Band management.
    Out-of-Band management occurs on a communication channel that also is used for other communications on the network. In-Band management uses a different physical connection to the network appliance to enable management.
    30s
  • Q11
    What might be implemented to improve the security of In-Band management?
    Using a management VLAN
    Using telnet to connect to the terminal-based management interface
    Using HTTP to connect to the browser-based management interface
    Using FTP to transfer configuration files
    30s
  • Q12
    SFTP uses what port?
    TCP port 23
    TCP port 22
    TCP port 21
    TCP port 20
    30s
  • Q13
    An administrator downloads configuration files to a router over User Datagram Protocol (UDP) port 69. The router can read and write the files but cannot browse the directory or delete files. What remote management method does this scenario demonstrate?
    TFTP
    SCP
    FTPS
    SFTP
    30s
  • Q14
    What is the principal means of obtaining secure remote access to a Linux server?
    SSH
    VNC
    Telnet
    Remote Desktop Protocol
    30s
  • Q15
    A network uses a Virtual Private Network (VPN) that requires a Remote Access Server (RAS) listening on port 443. An encrypted tunnel sends authentication credentials to a Remote Authentication Dial-In User Service (RADIUS) server for processing. What type of VPN does the network use?
    PPTP
    TLS
    IPsec
    DMVPN
    30s

Teachers give this quiz to your class