Remote Access Technologies for Managing Computers Remotely without Modifying Network Configuration

Best Remote Access Technologies for Managing Computers Remotely without Modifying Network Configuration

Question

A technician wants to deploy a solution to manage a computer remotely.

The technician is not allowed to modify any network configuration and is not able to forward any ports on the router to internal devices.

Which of the following remote access technologies would be BEST suited for this situation?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E.

C.

Given the constraints of not being able to modify any network configuration or forward ports on the router, the technician's best option is to use a remote access technology that can operate over the existing network infrastructure.

Out of the given options, the best-suited remote access technology for this situation is Virtual Network Computer (VNC).

VNC is a remote access technology that enables a user to remotely control another computer. VNC operates by transmitting screen updates from the remote computer to the local computer, and transmitting keyboard and mouse input from the local computer to the remote computer. VNC requires only outbound network connectivity, meaning that the computer being accessed does not need to have any special network configuration or firewall rules in place.

Remote Desktop Protocol (RDP) is another remote access technology that allows users to connect to a remote computer and interact with it as if they were physically present. RDP is typically used in Windows environments and requires inbound network connectivity, which means that the router would need to be configured to forward RDP traffic to the computer being accessed. Since the technician is not allowed to modify any network configuration, RDP is not the best option for this situation.

Telnet is a network protocol that enables a user to remotely access a command-line interface on another computer. Telnet requires inbound network connectivity, and it is not an encrypted protocol, which means that any traffic transmitted over Telnet can be intercepted and read. Telnet is an outdated protocol and is not recommended for remote access.

Third-party tools refer to any remote access tools that are not provided by the operating system or network infrastructure. Third-party tools may include remote desktop software, virtual private network ( VPN) clients, or other proprietary tools. The effectiveness of third-party tools will depend on the specific tool being used and its compatibility with the existing network infrastructure.

Secure Shell (SSH) is a network protocol that provides secure remote access to a command-line interface on another computer. Like Telnet, SSH requires inbound network connectivity, but it encrypts all traffic transmitted over the connection, providing additional security. SSH is commonly used in Unix and Linux environments and is not well-suited for managing Windows computers.

In summary, given the constraints of not being able to modify any network configuration or forward ports on the router, the technician's best option for remote access is Virtual Network Computer (VNC). VNC requires only outbound network connectivity and is well-suited for managing both Windows and Unix/Linux computers.