Remote-access Guide

chapter 09 configuring remote access services

by Ms. Zula Wuckert Published 2 years ago Updated 2 years ago
image

When configuring the remote access server which of the following is lashonda most likely to do?

When configuring the remote access server, which of the following is Lashonda most likely to do? She will select the Demand-dial connections service.

Which TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

The use of SSL/TLS over TCP port 443 (by default, port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.

What statement regarding the password authentication protocol is accurate?

What statement regarding the Password Authentication Protocol is accurate? PAP can perform authentication, but does not require it. What is NOT one of the tasks that can be performed using the Device Manager? Virtual devices can be installed.

Which VPN feature ensures packets are not modified while in transit?

Firewalls. Which VPN feature ensures packets are not modified while in transit? Data integrity.

Which port should I use for VPN?

The default protocol and port for Mobile VPN with SSL is TCP port 443, which is usually open on most networks.

What port does SSTP VPN use?

port 443SSTP, however, uses port 443, which is the SSL/TLS port used in web applications. Since SSTP uses the same 443 port, it isn't typically blocked on any network, including a workplace environment. You can use an SSTP VPN on any network without worry about administrators restricting it.

Which is the simplest password-based authentication mechanism in networking?

Clear Text PasswordClear Text Password A clear-text password is the simplest password-based mechanism. in this mechanism, the user id and password are assigned to the user. for securing purposes, the user changes the password periodically. the password is stored in the database against the user ID in clear text format.

What is the difference between CHAP and EAP?

PAP and CHAP are simple when compared with EAP, which is really more of an authentication framework than a security protocol. Within the framework, there are 40 different authentication methods that can be used. In each request or response between the server and the client, a “type” for authentication is specified.

What form of authentication is password-based authentication?

Password-Based Authentication is the process of gaining access to resources which one is entitled to with the help of a set of credentials containing username and password. This is a rampantly used method known for process simplicity and low cost.

Why use a VPN for client to server connections over the Internet?

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.

What are features of IPSec?

IPSec contains the following elements: Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity. Authentication Header (AH): Provides authentication and integrity. Internet Key Exchange (IKE): Provides key management and Security Association (SA) management.

What is integrity in VPN?

Data Integrity protects data from interception and modification. Data integrity ensures data has not been altered when in transmit. In the case with VPN's, it is there to ensure data has not been intercepted and changed when traveling from one VPN gateway to another VPN gateway.

Which server role would you install to establish VPN access to your network?

Install the Remote Access role by using Server Manager On the VPN server, in Server Manager, select Manage and select Add Roles and Features.

Which VPN protocol supports the VPN Reconnect feature?

Internet Key Exchange v2 (IKEv2)VPN Reconnect, which requires the VPN server to be set up on Windows Server 2008 R2, uses the Internet Key Exchange v2 (IKEv2) tunneling protocol with a MOBIKE extension.

What is the preferred method to configure clients to use work folders?

There are several ways to configure clients for accessing Work Folders. Automatic discovery is the most preferred method because it supports devices that are not domain joined. Automatic discovery of the Work Folders URL is based on the email address of the user.

Which VPN authentication protocol uses SSL TLS?

OpenVPNOpenVPN. Probably the most popular VPN protocol. OpenVPN uses TLS with SSL/TLS for private key exchange. It relies on the OpenSSL crypto library - an index of secure cryptography algorithms that make your tunnel safer.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9