Cengage Windows Server 2019 Chapter 9.2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

RADIUS

A client/server protocol and software that enable remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. 

2
New cards

Remote Access Management Console

Tool used to configure and manage DirectAccess. 

3
New cards

remote access policy

A policy that contains conditions that must be met for the policy to apply to the remote access client. 

4
New cards

remote access server

A server that accepts requests from remote access clients on the Internet. 

5
New cards

Remote Desktop

A remote access technology that uses a different method to achieve remote access compared to VPNs and DirectAccess. Instead of relaying network traffic through an encrypted tunnel to a DMZ, remote access clients use a Remote Desktop app to log into a remote access server to obtain a graphical desktop session on the remote access server itself (called session-based desktop deployment), or a graphical desktop session from a Hyper-V virtual machine running on the remote access server (called virtual machine-based desktop deployment). 

6
New cards

Remote Desktop Protocol (RDP)

A proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to another computer over a network connection.  

7
New cards

Remote Desktop Services

One of the components of Microsoft Windows that allows a user to take control of a remote computer or virtual machine over a network connection. 

8
New cards

RemoteApp

A virtual application solution that allows users to run Windows-based applications regardless of what operating system they are using. It allows users to launch virtual applications from a server that appear on their computer as if they are installed locally, but in reality are running on a remote server. 

9
New cards

RemoteApp and Desktop Connections

A tool that helps in taking control of remote Windows computers and troubleshooting them remotely. 

10
New cards

reverse proxy

A type of proxy server that retrieves resources on behalf of a client from one or more servers. These resources are then returned to the client, appearing as if they originated from the proxy server itself. 

11
New cards

Routing and Remote Access

A Microsoft API and server software that make it possible to create applications to administer the routing and remote access service capabilities of the operating system to function as a network router. Developers can also use this to implement routing protocols. 

12
New cards

Secure Socket Tunneling Protocol (SSTP)

A VPN technology that tunnels data through HTTPS packets on a network. It originally used Secure Sockets Layer (SSL) encryption with 128-bit keys. However, modern implementations use 256-bit keys alongside Transport Layer Security (TLS) encryption. The remote access server must contain an HTTPS encryption certificate. 

13
New cards

Secure Sockets Layer (SSL)

A networking protocol designed for securing connections between Web clients and Web servers over an insecure network, such as the Internet. After being formally introduced in 1995, this technology made it possible for a Web server to securely enable online transactions between consumers and businesses. Due to numerous protocol and implementation flaws and vulnerabilities, it was deprecated for use on the Internet by the Internet Engineering Task Force (IETF) in 2015 and has been replaced by the Transport Layer Security (TLS) protocol. 

14
New cards

service forwarding

Allows requests for a particular port or service to be forwarded to an internal server in the DMZ. 

15
New cards

session-based desktop deployment

An individual session running inside a server operating system on either a virtual machine or a physical server. There can be multiple user sessions per virtual/physical machine; i.e., each virtual/physical machine is shared by multiple users. 

16
New cards

split tunneling

A concept that allows a user to access dissimilar security domains like a public network and a local LAN or WAN at the same time, using the same or different network connections. 

17
New cards

Transport Layer Security (TLS)

A protocol used to provide privacy and data integrity between two or more communicating computer applications. 

18
New cards

virtual machine-based desktop deployment

An individual virtual machine running a desktop operating system. Each user connects to their own virtual desktop client system. 

19
New cards

virtual private networks (VPNs)

Networks that extend a private network across a public network and enable users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. 

20
New cards

VPN Protocol

A set of rules that are used to negotiate a connection between the VPN client and the VPN server. Here are the most commonly used examples today: PPTP, SSTP, and L2TP/IPSec. 

21
New cards

VPN tunnel

An encrypted link between your computer or mobile device and an outside network. It can provide a way to cloak some of your online activity.