Match each item with a statement below.
A. a system that allows users to synchronize a single folder on a file server between multiple devices
B. a system that allows dial-up or VPN clients to remotely retrieve and save data as though they are on the local network, but with much slower performance
C. an always-on replacement for on-demand VPN connections
D. a feature in Windows 10 that allows a helper to connect to a Windows 10 computer and view the screen or remotely control the computer
E. a framework that allows multiple authentication protocols to be integrated with the VPN sign-in process
F. an encrypted connection from a client to a remote access server over a public network
G. a newer VPN protocol that uses IPsec to secure data, but can authenticate by using a user name and password
H. an older VPN protocol that authenticates based on user name and password
I. a system for remote data or application access where only screen draw commands and keystrokes are sent between the client and computer being remote controlled
A. Work Folders
B. remote access
C. DirectAccess
D. Remote Assistance
E. Extensible Authentication Protocol (EAP)
F. virtual private network (VPN)
G. Internet Key Exchange v2 Tunneling Protocol (IKEv2)
H. Point-to-Point Tunneling Protocol (PPTP)
I. remote control
You might also like to view...
Explain when it may be cost-effective to use formal specification and verification in the development of safety-critical software systems. Why do you think that critical systems engineers are against the use of formal methods?
What will be an ideal response?
Explain the differences between public, private, and community clouds. What are some of the factors to consider when choosing which of the three to use?
What will be an ideal response?
If a flagged word is spelled correctly, right-click it and then click ____ on the shortcut menu to instruct Word not to flag future occurrences of the same word in this document.
A. Not a Mistake B. Correct Spelling C. Do Not Correct D. Ignore All
A user reports the inability to access a company server using the FTP protocol. A technician finds other ports to the server seem to work normally. The technician has determined the problem is an incorrectly configured software firewall on the user's machine. Which of the following is MOST likely the cause?
A. Incoming connections on port 445 are blocked. B. Outgoing connections on port 443 are blocked. C. Incoming connections on port 143 are blocked. D. Outgoing connections on port 80 are blocked. E. Outgoing connections on port 21 are blocked.