Pass your certification exam. Faster. Guaranteed.

Join the 40,000+ candidates in over 58 countries that have found a faster, better way to pass their certification exam.

BASIC

Comprehensive practice exam engine!

  • Unlimited access to thousands of practice questions
  • Exam readiness score
  • Smart reinforcement

PRO

All features in the FREE plan, plus:

  • Focused training ensures 100% exam readiness
  • Personalized learning plan
  • Align exam engine to your current baseline knowledge
  • Eliminate wasted study time
  • Exam pass guarantee
  • And much more

Remote Access Security Transcription

Welcome to our remote access security module. Remote access service was originally developed for dial-up modems, so that road warriors, or individuals working from home could dial in to the network to access resources. And this was accomplished using a modem bank or a collection of modems. This would reduce the cost of dedicated leased lines by simply using existing telephone lines.

And this provided flexibility for your remote workers. Your remote user would use their home computer and their dial-up modem and phone line to connect to the bank of modems located at your organization, would then authenticate using the remote access server. And once authenticated, would be provided access to your corporate LAN so that they could access necessary resources.

There are several different VPN and tunneling protocols that can be used for remote access. Remote access services or RAS, dial-up with RAS, Point-to-Point Protocol, which is an older dial-up remote protocol. We have several different types of authentication protocols that can be used to ensure that an individual is who they claim to be.

PAP, CHAP and EAP and some of the newer VPN tunneling protocols, such as PPTP, Point-to-Point Tunneling Protocol, L2TP, Layer Two Tunneling Protocol with IPsec, and SSL, TLS, SSTP, or Secure Socket Tunneling Protocol. There are several different authentication protocols which are used with virtual private networks. Two of the most common protocols used are Microsoft CHAP version 2, and extensible authentication protocol, or EAP.

There are a few different security mechanisms that were used with dial-up networking to provide where you are geolocation authentication. Callback was a location verification. When an individual wanted to connect to the network they would provide their credentials and the access server would then hang up on them and call them back at a preconfigured number.

This way they knew they were dialing a specific number that was provided by that user. This is not very flexible if the user leaves from that phone number or that location, you will not be able to contact them back, and they will not be able to establish a connection.

And you also do not really know who resides at that number. Caller ID service was more flexible. You would provide a list of acceptable numbers and the caller ID verification would be made when the individual dialed in to verify that it was on the approved list of persons that could connect.

The individual would connect using their phone line andPoint-to-Point Protocol. And then the verification would occur at your remote access server, and as long as the verification was successful, the individual would receive access to the corporate LAN. Point-to-Point Protocol, or PPP, is an obsolete protocol that is no longer frequently used.

It allowed data to be encapsulated over a serial line for dial-up modem connectivity. It can encapsulate older protocols that cannot route through the Internet, but can also work point-to-point. War dialing was a common type of attack where individuals would dial sequential numbers until they found a modem and then would attempt to attack that system.

There are several different methods that can be used to authenticate a user, including PAP, CHAP, and EAP. Microsoft Remote Desktop Protocol is another way to remotely connect to and control a Windows PC. Remote Desktop Protocol commonly uses port 3389 by default, but it is possible to change this port so that it uses a different port.

Secure Shell technology, or SSH, uses port 22 to create a tunnel to remotely control a system but this is not a VPN connection. It is a way of providing remote secure terminal sessions, such as a command prompt, providing secure terminal access to a remote system. And you should not use Telnet or Unix R utilities.

Telnet is not secure because it transmits the user's password in clear text, and if there is an attacker sniffing on the network, the attacker would be able to capture that password. Secure Shell also supports encrypted file transfer through SFTP or Secure File Transfer Protocol. For the CISSP examination, you should remember that Microsoft Remote Desktop Protocol uses port 3389 by default and can be used to control a Windows PC.

You should remember that Secure Shell is more secure than Telnet, and the reason we do not use Telnet is because it transmits the user's credentials in clear text. This concludes our remote access security module, thank you for watching.

Included in all plans.

1000's of practice test questions

Classified by skill and ranked by difficulty. Choose to answer questions in STUDY MODE to review and you go.

Exam Readiness Score

Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.

Smart Reinforcement

Don’t forget what you’ve just studied! Use the intelligent reinforcement questions to stay fresh.

THANK YOU! Just bloody thank you! I’m doing the CEH minor at my college and well...I’ve learned more from this site in a few hours than I’ve learned from my school in 9 weeks about the subject. Keep up the good work!

PRO Membership Benefits.

Personalized Learning Plan

Skillset’s Exam Engine continuously assesses your knowledge and determines when you are ready take and pass your exam. When Skillset learns that there is a gap between your knowledge and what you need to know to pass, we present you with a focused training module that gets you up to speed quickly. No fluff! Find your knowledge gaps and fill them.

Exam Pass Guarantee

Skillset is confident that we can help anyone pass their exam. If you reach 100% readiness, and you do not pass your exam, we will refund you plus pay for a replacement exam voucher. That’s how powerful our learning system is, we can offer this guarantee and stand behind our products with this no risk to you guarantee. See terms and conditions.

Eliminate Wasted Study Time

Don’t waste time studying concepts you have already mastered. Focus on what you need to know to pass. The Skillset Competency Diagnostic aligns our Exam Engine and Learning Plan to your baseline knowledge. This saves an average of 31% of the time required to prep for a professional certification exam.

Coming Soon - Simulated Exam

More PRO benefits are being built all the time!