Remote-access Guide

chapter 09 configuring remote access services answers

by Ms. Treva Metz Published 2 years ago Updated 2 years ago

When configuring the remote access server which of the following is lashonda most likely to do?

When configuring the remote access server, which of the following is Lashonda most likely to do? She will select the Demand-dial connections service.

Which TCP port should be open and accessible to allow remote access VPN utilizing SSTP to function?

The use of SSL/TLS over TCP port 443 (by default, port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.

What statement regarding the password authentication protocol is accurate?

What statement regarding the Password Authentication Protocol is accurate? PAP can perform authentication, but does not require it. What is NOT one of the tasks that can be performed using the Device Manager? Virtual devices can be installed.

Which VPN feature ensures packets are not modified while in transit?

Firewalls. Which VPN feature ensures packets are not modified while in transit? Data integrity.

Which port is best for VPN?

UDP is a good choice if the majority of the traffic generated by your Mobile VPN with SSL clients is TCP-based. The HTTP, HTTPS, SMTP, POP3 and Microsoft Exchange protocols all use TCP by default.

What port does SSTP VPN use?

port 443SSTP, however, uses port 443, which is the SSL/TLS port used in web applications. Since SSTP uses the same 443 port, it isn't typically blocked on any network, including a workplace environment. You can use an SSTP VPN on any network without worry about administrators restricting it.

Which is the simplest password-based authentication mechanism in networking?

Clear Text PasswordClear Text Password A clear-text password is the simplest password-based mechanism. in this mechanism, the user id and password are assigned to the user. for securing purposes, the user changes the password periodically. the password is stored in the database against the user ID in clear text format.

What protocol should be used when simple username password authentication is needed?

Password Authentication Protocol (PAP) is a simple user authentication protocol that does not encrypt the data and sends the password and username to the authentication server as plain text.

What form of authentication is password-based authentication?

Password-Based Authentication is the process of gaining access to resources which one is entitled to with the help of a set of credentials containing username and password. This is a rampantly used method known for process simplicity and low cost.

Why use a VPN for client to server connections over the Internet?

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more.

What is confidentiality in IPSec?

Data confidentiality—The IPSec sender can encrypt packets before transmitting them across a network. Data integrity—The IPSec receiver can authenticate packets sent by the IPSec sender to ensure that the data has not been altered during transmission.

What is integrity in VPN?

Data Integrity protects data from interception and modification. Data integrity ensures data has not been altered when in transmit. In the case with VPN's, it is there to ensure data has not been intercepted and changed when traveling from one VPN gateway to another VPN gateway.

Which server role would you install to establish VPN access to your network?

Install the Remote Access role by using Server Manager On the VPN server, in Server Manager, select Manage and select Add Roles and Features.

Which VPN protocol supports the VPN Reconnect feature?

Internet Key Exchange v2 (IKEv2)VPN Reconnect, which requires the VPN server to be set up on Windows Server 2008 R2, uses the Internet Key Exchange v2 (IKEv2) tunneling protocol with a MOBIKE extension.

What is the preferred method to configure clients to use work folders?

There are several ways to configure clients for accessing Work Folders. Automatic discovery is the most preferred method because it supports devices that are not domain joined. Automatic discovery of the Work Folders URL is based on the email address of the user.

Which VPN authentication protocol uses SSL TLS?

OpenVPNOpenVPN. Probably the most popular VPN protocol. OpenVPN uses TLS with SSL/TLS for private key exchange. It relies on the OpenSSL crypto library - an index of secure cryptography algorithms that make your tunnel safer.

What is a private network address?

An address for devices on a private network that can't be routed on the Internet.

What is IP reallocation?

A process that reallocates bits from an IP address's host portion to the network portion, creating multiple smaller address spaces.

What is automatic tunneling protocol?

An automatic tunneling protocol used to transmit IPv6 packets between dual IP layer hosts across an IPv4 network. See also dual IP layer architecture.

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9