Discuss the differences between dial-up remote access and VPN remote access. What protocols are used for each type of access?

Trump administration supports a set of economic policy recommendations that breaks from the previous administration.
July 21, 2019
Issues and Dilemmas of Contemporary Public Administration
July 21, 2019

Discuss the differences between dial-up remote access and VPN remote access. What protocols are used for each type of access?

Question Description

Assignment Instructions:

In this Assignment, you will complete steps that cover remote access, wireless networks, and remote assistance. Use your Virtual Machine (VM) in those steps requiring screenshots and make sure to follow the proper label (a brief description), naming conventions, and question number at the top of each screen shot.

Using your favorite search engine, in your APA formatted paper answer the questions found in the Assignment rubric below. You must include both a Title page and a Reference page and citations.

  • Discuss the differences between dial-up remote access and VPN remote access. What protocols are used for each type of access? What are the requirements of each? Which would you recommend for an at-home worker?
  • Describe the differences between WEP and WPA security.
  • Describe the steps that you need to set up a new wireless network in your Windows 10 environment.
  • Remote Assistance: Go to search and type “remote” and select “Allow Remote Access to Your Computer.” Take a screenshot of the Remote Assistance Settings window allowing the computer to be controlled remotely and that invitations can only be used from computers running Windows Vista or later. What are the benefits of remote assistance? Give examples of when remote assistance would be used. Take a screen capture of an example.
  • Requesting Remote Assistance: In a bulleted list and orderly fashion, describe the steps you need to take in order to send an invitation to a friend or colleague to access your computer. Take a screenshot of the invitation file and the 12 letters password. Explain any challenges found.