1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
RADIUS
A client/server protocol and software that enable remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
Remote Access Management Console
Tool used to configure and manage DirectAccess.
remote access policy
A policy that contains conditions that must be met for the policy to apply to the remote access client.
remote access server
A server that accepts requests from remote access clients on the Internet.
Remote Desktop
A remote access technology that uses a different method to achieve remote access compared to VPNs and DirectAccess. Instead of relaying network traffic through an encrypted tunnel to a DMZ, remote access clients use a Remote Desktop app to log into a remote access server to obtain a graphical desktop session on the remote access server itself (called session-based desktop deployment), or a graphical desktop session from a Hyper-V virtual machine running on the remote access server (called virtual machine-based desktop deployment).
Remote Desktop Protocol (RDP)
A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.
Remote Desktop Services
One of the components of Microsoft Windows that allows a user to take control of a remote computer or virtual machine over a network connection.
RemoteApp
A virtual application solution that allows users to run Windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if they are installed locally, but in reality are running on a remote server.
RemoteApp and Desktop Connections
A tool that helps in taking control of remote Windows computers and troubleshooting them remotely.
reverse proxy
A type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client, appearing as if they originated from the proxy server itself.
Routing and Remote Access
A Microsoft API and server software that make it possible to create applications to administer the routing and remote access service capabilities of the operating system to function as a network router. Developers can also use this to implement routing protocols.
Secure Socket Tunneling Protocol (SSTP)
A VPN technology that tunnels data through HTTPS packets on a network. It originally used Secure Sockets Layer (SSL) encryption with 128-bit keys. However, modern implementations use 256-bit keys alongside Transport Layer Security (TLS) encryption. The remote access server must contain an HTTPS encryption certificate.
Secure Sockets Layer (SSL)
A networking protocol designed for securing connections between Web clients and Web servers over an insecure network, such as the Internet. After being formally introduced in 1995, this technology made it possible for a Web server to securely enable online transactions between consumers and businesses. Due to numerous protocol and implementation flaws and vulnerabilities, it was deprecated for use on the Internet by the Internet Engineering Task Force (IETF) in 2015 and has been replaced by the Transport Layer Security (TLS) protocol.
service forwarding
Allows requests for a particular port or service to be forwarded to an internal server in the DMZ.
session-based desktop deployment
An individual session running inside a server operating system on either a virtual machine or a physical server. There can be multiple user sessions per virtual/physical machine; i.e., each virtual/physical machine is shared by multiple users.
split tunneling
A concept that allows a user to access dissimilar security domains like a public network and a local LAN or WAN at the same time, using the same or different network connections.
Transport Layer Security (TLS)
A protocol used to provide privacy and data integrity between two or more communicating computer applications.
virtual machine-based desktop deployment
An individual virtual machine running a desktop operating system. Each user connects to their own virtual desktop client system.
virtual private networks (VPNs)
Networks that extend a private network across a public network and enable users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.
VPN Protocol
A set of rules that are used to negotiate a connection between the VPN client and the VPN server. Here are the most commonly used examples today: PPTP, SSTP, and L2TP/IPSec.
VPN tunnel
An encrypted link between your computer or mobile device and an outside network. It can provide a way to cloak some of your online activity.