8.3 Remote Services
File transfer software
A software that transmits files from one device to another. This can be done over the internet or a local area network. These programs are commonly used to download files from a cloud-based server.
Where can you access a remote desktop client?
With a Remote Desktop client using a Windows, iOS, macOS, or Android device. You cannot use Remote Desktop Client to connect to a Windows Home machine. You can use a Windows Home computer to connect to a Windows Pro or Enterprise machine.
How and where do you provide assistance via remote assistance?
You access the same Windows Remote Assistance window, but you select Help someone who has invited you. You'll be prompted to enter the information provided to you by the user.
What is Microsoft Remote Assistance(MSRA) used for?
You can use Microsoft Remote Assistance to turn over control of your system to another remote user.
What is required to run Screen Sharing?
You need the Virtual Network Computing (VNC) client software which is built into Mac OS X and later versions. Earlier versions require the download of a third-party client software.
Rachel wants to use Screen Sharing to allow a system administrator to remotely access her Apple iMac. However, when she initiates the Screen Sharing session, the administrator is not able to access her iMac desktop from his iMac computer. What is the MOST likely reason that the administrator cannot access the Screen Sharing session? The Observe mode is not enabled. The administrator is not included in her Specific Users Only list. The VNC Viewer setting is not enabled. Screen Sharing is not enabled on Rachel's iMac.
The administrator is not included in her Specific Users Only list. Explanation The most likely reason that the administrator cannot access the Screen Sharing session is that Rachel has the Specific Users Only option selected, and the administrator is not listed as a user that can access her iMac. As Rachael has started a Screen Sharing session, this feature must already be enabled. The VNC Viewer setting is only necessary when you want to connect to a session from a Windows or Linux computer. The Observe mode limits the interaction to just the user (such as when giving a presentation), but relies on the session's successful initiation.
What do you use a SSH connection for?
* Remote login. * File transfer. * Running programs. Used to access servers remotely.
What does Screen Sharing allow?
* See the desktop interface as if you were sitting in front of it. * Manipulate files. * Run programs on the remote computer. * Restart or power down the computer.
For MSRA to work the user must:
* Allow remote assistance. * Request assistance. * Provide a password to the remote user. * Approve the remote connection.
File transfer software security considerations include:
* Be aware that file-sharing can open the door to malware infection or hacking. * Use end-to-end encryption. * Use two-factor authentication. * Use strong passwords.
MSRA security considerations include:
* Disable remote assistance if it is not in use. * Use a strong password. * Use two-factor authentication. * Keep software up to date.
What does Video conferencing software include?
* Face-to-face social interaction. * Team collaboration. * Organizational meetings. * Interviews. * Webinars. * Technical support.
What can you do with Desktop Management Software?
* Install hardware. * Install software. * Manage user permissions. * Audit device activity. * Apply spam filters.
What is the Remote Desktop Connection tool used for?
* Interact with the desktop Interface * Manipulate Files * Run Programs * Restart or power down
Note the following considerations regarding Remote Desktop access:
* The Remote Desktop Protocol (RDP) is the Windows protocol used by Remote Desktop to connect to and control a remote computer. * You cannot connect to a computer that is turned off. * You must have local network or internet access to the remote computer. * Remote Desktop connections must be allowed through a firewall to connect to a remote computer. * You can use the Remote Desktop Users group to specify the users allowed to establish Remote Desktop sessions to a system. Members of the Administrators group are granted access by default. * While a Remote Desktop session is active, no one else can log in without disconnecting the remote session.
RDP security considerations include:
* Use two-factor authentication. * Use a strong password. * Keep software up-to-date. * Use a firewall to restrict access. * Set an account lockout policy.
Video conferencing security considerations include:
* Use waiting room features. * Use strong passwords.
SSH security considerations include:
* VNC is not secure or encrypted by default. * Remote Login must be enabled in System Preferences to ensure that an SSH tunnel is established before using the VNC.
What needs to be enabled in order to use Remote Desktop (RDP)?
* Verify that the system you are connecting to allows remote connections. * Know the IP address of the system. If the system is on the local network, you need to know only the name of the system. * Enter the credentials of the system administrator account.
How do you ensure security during a windows remote assistance session?
* View Remote Assistance invitations with caution. * Accept invitations only from people you know and trust. If an invitation comes from outside your company, you may not want to accept it. * Be aware that an attacker can embed a virus or worm into something that looks like a Remote Assistance invitation. * Verify all invitations before opening.
What are common applications used with (Remote Desktop) RDP?
* Work from home. * Technical support
What are 2 Screen Sharing modes?
- Control mode allows you to control the system as if you were physically at the computer. - Observe mode places control of the system in the hands of the user. It is typically used when giving a presentation.
Remote Assistance (differences from Remote Desktop)
1. Designed for providing or receiving help. 2. Remote user gains only partial control of the system. 3. User remains logged in during the assistance. 4. The user initiates the session.
Remote Desktop (differences from Remote Desktop)
1. Designed for user productivity. 2. Remote user gains full control of the system. 3. Only one user is logged on at a time. 4. The remote user initiates the session.
How do you connect to another computer using Windows Remote Desktop Connection (RDC)?
1. Open the Windows Remote Desktop Connection tool using the Start menu and going to Windows 2. Accessories. Alternatively, you can start this tool by opening Run, typing 'mstsc', and pressing Enter. 3. Enter the name or IP address of the computer that you want to connect to. 4. Click the arrow next to Show Options to configure remote connection settings. 5. Configure the settings. 6. Click Connect. 7. Enter the password for the remote system. Click Ok.
How do you create and send an invitation in Remote Assistance Invitation?
1. Save the invitation as a file. 2. Send the invitation in an email. 3. Use Easy Connect. Once the Remote Assistance session is closed, it is not possible to reconnect to that same session again. If additional help is required, a new Remote Assistance invitation must be issued because the previous one is no longer valid.
How do you enable remote assistance in Remote Assistance Invitation?
1. Type 'remote assistance' into the Search box. 2. Select Allow Remote Assistance connections to this computer. 3. Once enabled:Type 'remote assistance' into the Search box. 4. Select Allow someone you trust to help you.
What are the security concerns associated with remote access?
1. Weak remote access policies 2. A deluge of new devices to protect 3. Lack of visibility into remote user activity 4. Users mixing home and business passwords 5. Opportunistic phishing attempts
What does remote access allow?
A host to remotely connect to a computer at a different location using a local area network or the internet.
What is Quick assist?
A newer Windows app that provides an easy method to receive or provide assistance remotely. To assist another user. 1. Access Quick Assist through the Search box. 2. Select the option to assist another person. 3. Send the six-digit code to the person you want to help. After the user has entered the six-digit code into Quick Assist, you'll be able to either view the screen or take control of the system.
What is Remote Desktop(RDP)?
A secure network communications protocol developed by Microsoft. It enables network administrators to remotely diagnose problems that individual users encounter and gives users remote access to their physical work desktop computers.
What is Windows Remote Desktop Connection (RDC)?
A tool that provides the user access to a Windows desktop from a remote location through a network.
What is VNC (Virtual Network Computing)?
A type of remote-control software that makes it possible to control another computer over a network connection.
What can you do with Remote Desktop (RDP)?
Access the graphical desktop of other Windows systems * See the desktop interface as if you were sitting in front of it. * Manipulate files. * Run programs. * Restart or power down the computer.
What is Desktop management software?
Designed to help IT staff manage an organization's devices from one location.
What do you do before accessing a computer remotely?
Enable Remote Desktop 1. Right-click the Start menu. 2. Select System. 3. Select Remote Desktop. 4. Toggle the Remote Desktop option to On. 5. Click Confirm when asked if you want to allow the function.
How do you enable non-Mac systems to use Screen Sharing?
Enable the VNC viewer setting and specify a VNC password.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from an employee who is having problems with an application. He tries to describe what he is doing in the application, but you just can't understand what might be causing the problem. Which of the following is the BEST way to provide the assistance the employee needs? (Select two.) Establish a Quick Assist session with the employee and watch what he is doing. Establish a Remote Assistance connection and watch what the employee is doing. Schedule the employee to receive more training on using the application. Establish a Remote Desktop connection and perform the task on the employee's system. Drive to the other location as soon as possible and then watch as the employee performs the task.
Establish a Quick Assist session with the employee and watch what he is doing. Establish a Remote Assistance connection and watch what the employee is doing. Explanation The best approach is to instruct the employee to establish a Remote Assistance or Quick Assist session to watch what he is doing. In the session, you could also take control and show the employee how to complete the task. With Remote Desktop, you could try to perform the task on the employee's computer, but the employee would not be able to see what you were doing. Driving to the location or scheduling training would not be as effective or timely as establishing a Remote Assistance or Quick Assist session.
You provide desktop support for a small company. The company has two locations in the same city, but they are several miles away. You get a call from a user who is having problems installing a new device. You try to tell the user how to update the device driver over the phone, but he is having a hard time understanding your directions and is becoming frustrated. What is the BEST method for resolving the user's issue? Escalate the call to another technician or your supervisor. Establish a Remote Desktop connection and update the driver. Tell the user to wait until you are scheduled to be in that location. Drive to the other location as soon as possible and update the driver.
Establish a Remote Desktop connection and update the driver. Explanation As long as it is set up correctly, you can use Remote Desktop to connect to the user's system remotely. You can then perform tasks as if you were at their computer. Driving to the other location, telling the user to wait, or escalating the call would all cause further frustration, and none of these options provides the best solution to the issue.
Screen Sharing
In OS X, a utility to remotely view and control a Mac and is similar to Remote Assistance in Windows. * Access a system remotely. * Help troubleshoot an issue on a client's system. * Give a presentation or collaborate on a project with others.
Screen Sharing Considerations
Keep in mind the following information regarding Screen Sharing: Screen Sharing is disabled by default. To enable Screen Sharing, complete the following steps: 1. Select the Apple menu 2. Select System Preferences 3. Select Sharing 4. Select Screen Sharing - In the Screen Sharing settings dialog, you can specify the users (e.g., all registered users, specific users only, or anyone who requests access) who can connect to the system. - Systems on the network with Screen Sharing enabled appear in the Shared category in the Finder window. -With the Shared Clipboard setting enabled, text can be copied between the remote system and the local system. - You can customize display and quality settings to match the remote system's settings and connection speed.
Can you connect to a remote assistance session once it's closed?
No, it is not possible to reconnect to that same session again. If additional help is required, a new Remote Assistance invitation must be issued because the previous one is no longer valid.
You are a network administrator for a large financial institution. There are several account advisors who are constantly on the road with their Windows laptop devices. You want to be able to occasionally check on the health of these laptops, including the ability to receive automated alerts for any unusual activity that may indicate some kind of security breach. Which of the following remote management technologies would BEST help you monitor these laptops? Desktop management software MSRA RMM File transfer software
RMM Explanation Remote management and monitory (RMM) software lets you perform tasks remotely, such as analyzing activity and receiving automated alerts for unusual device activity. An RMM is the best solution in this scenario. While desktop management software can help you remotely perform tasks such as installing software and managing user permissions, it is not specifically designed to check on device health or security. File transfer software is specifically designed for secure remote transfer of files from one device to another. This software is not designed to manage and monitor devices. Microsoft Remote Assistant (MSRA) is designed for technical support and troubleshooting by turning control of your system to another remote user. MSRA is not designed for continuous remote device monitoring or management.
Which remote access solution provides you with full remote access to the graphical desktop of a Windows system, including the ability to run programs, manipulate files, and restart or power down the computer? Telnet Screen Sharing Remote Desktop Remote Assistance
Remote Desktop Explanation Remote Desktop provides a remote user with full access to the graphical desktop of a Windows system. This allows them to run programs, manipulate files, and restart or power down the computer (just like a regular user). Remote Assistance does not provide full graphical desktop access. Telnet does not provide full graphical desktop access. Screen Sharing is designed for macOS.
What is the difference between Remote Desktop and Remote Assistance?
Remote Desktop Connection allows you to take full control of a remote computer (including exclusive access to the Desktop, documents, programs, etc.), while Windows Remote Assistance allows you to give partial control to your own computer (shared desktop, mouse and keyboard) in order to get help from a remote friend or technical person.
A user works primarily in your organization's production area. However, she frequently needs to access data stored on the Windows 11 desktop system in her office while on the production floor. She would like to be able to use a Remote Desktop connection in the production area to remotely access her desktop system over the network. Which desktop user groups should you make her user account a member of in order to enable this Remote Desktop connection? (Select two.) Power Users Guests Remote Desktop Users Administrators Users
Remote Desktop Users Administrators Explanation Only users who are members of the Administrators or Remote Desktop Users groups are allowed to establish Remote Desktop connections with a Windows system. You can use either group. However, in this scenario, the best option would probably be to make her a member of the Remote Desktop Users group instead of Administrators to avoid granting her too many permissions and rights. Members of the Power Users, Users, and Guests groups are not allowed to establish Remote Desktop connections with a Windows system.
Which remote access solution is built into macOS? Screen Sharing Remote Desktop Remote Assistance Quick Assist
Screen Sharing EXPLANATION Screen Sharing is built into macOS. Remote Desktop, Remote Assistance, and Quick Assist are Windows solutions.
Who uses Remote Monitoring and monitoring software (RMM) the most?
Service providers and IT professionals.
What is Microsoft Remote Assistance (MSRA) commonly used for?
Technical support and troubleshooting purposes.
What is Telnet?
Telecommunication Network (telnet) is a remote access protocol that allows "virtual terminal" connections to any host on the Internet possessing a telnet server.
As a Help Desk Level 2 operator, you are attempting to use Remote Desktop to connect to an employee's Windows desktop to resolve a printing issue that has been escalated from a Level 1 operator. You know that both your Windows computer and the employee's Windows computer are configured correctly for this Remote Desktop connection. You also have the correct connection information. However, you are having problems accessing the employee's desktop. Which of the following is the MOST likely reason that you cannot connect to the desktop? Your firewall is not set up to allow the connection through port 3389. The remote session from the Level 1 operator has not been disconnected. You have the wrong IP address for the employee's computer. The employee's computer is turned off.
The remote session from the Level 1 operator has not been disconnected. Explanation In order for you to connect to the employee's desktop using Remote Desktop, all other remote connections must be inactive. Because this is an escalated issue from a Level 1 operator, it is highly likely that the Remote Desktop connection between the Level 1 operator and the employee's desktop has not been disconnected. If you have the correct connection information, the IP address that you need to enter should be correct. By default, when you enable Remote Desktop, the local Windows firewall is automatically updated with rules that allow Remote Desktop connections to be made to the computer. This includes opening TCP port 3389 to allow RDP traffic. Although you cannot connect to a computer that is turned off, it is highly unlikely that the employee's computer is turned off, as the Level 1 operator has just established an RDP connection with the desktop.
Which of the following is true of Remote Assistance? The user initiates the session. Only one user is logged in at a time. The remote user initiates the session. It is designed to improve user productivity.
The user initiates the session. Explanation With Remote Assistance, the user initiates the session. Remote Assistance allows both the user and the remote user to be logged in at the same time. Remote Desktop only allows one user (such as the remote user) to be logged in at a time. Remote Assistance is designed to provide or receive remote help. Remote Desktop is designed for user productivity.
Remote monitoring and monitoring(RMM)
There are many different remote monitoring and management software options on the market. While the specific features vary from one vendor to the next, you can use all RMM software to: * Manage devices. * Remotely access an organization's devices. * Analyze activity and receive automated alerts for unusual activity. * Monitor availability. * Determine thresholds.
What is Secure Shell used for?
To create a secure Telnet session. Telnet provides a remote connection to a system's command line interface.
Advanced (Remote Connection Settings)
Use the Advanced tab to: * Setup server authentication. * Configure settings to connect through Remote Desktop Gateway when working remotely.
Display (Remote Connection Settings)
Use the Display tab to configure the: * Size of the remote desktop by dragging the slider between Small and Large (full screen). * Color depth of the remote session (15 to 32 bit).
Experience (Remote Connection Settings)
Use the Experience tab to configure performance settings. This is especially important if you're using a slow connection.
General (Remote Connection Settings)
Use the General tab to enter the: * Name of the remote computer. * Username you want to use to access the remote computer.
Local Resources (Remote Connection Settings)
Use the Local Resources tab to configure the: * Remote audio settings. * Windows key combinations. * The devices and resources that you want to use in the remote session (printers, Clipboard, smart cards, ports, drives, etc.).
Which of the following actions should you take to BEST secure your video conferencing software? (Select two.) Apply spam filters. Use strong passwords. Use waiting room features. Use two-factor authentication. Disable the software when not in use. Use recording.
Use waiting room features. Use strong passwords. EXPLANATION Using waiting room features and a strong password can best help you secure your video conferencing software. While recording is a feature of video conferencing software, using recording will not directly impact the software's technical security. Although applying spam filters and using two-factor authentication are important security measures, they do not directly apply to video conferencing software security. You do not need to disable your video conferencing software when not in use for security purposes.