What are the three different methods of access enabled by the use of the Remote Access role, and how do these methods differ?

What will be an ideal response?


The Remote Access role enables remote access through three means: virtual private networking, DirectAccess, and Web Application Proxy. A virtual private network (VPN) is like a tunnel through a larger network-such as the Internet, an enterprise network, or both-that is restricted to designated member clients only. DirectAccess, which is built around IPv6, establishes two "tunnels" for connecting to a Direct Access server used in remote access and that is transparent to users and always on. Web Application Proxy entails publishing applications so that users external to an organization can access those applications on the organization's servers.

Computer Science & Information Technology

You might also like to view...

Text box controls have three ________ relating to tab order: Tab Index, Tab Stop, and Auto Tab

A) indices B) properties C) commands D) controls

Computer Science & Information Technology

Text files have no metadata associated with them

Indicate whether the statement is true or false.

Computer Science & Information Technology

What entity developed the 3G standard?

a. Telecommunications Industry Association b. Global System Communications Industry c. International Telecommunications Union d. Global Telecommunications Association

Computer Science & Information Technology

A(n) ____________________ is the command set that allows an organization to create secure connections using public resources such as the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology