IT FundamentalsA+

Remote Access Tools for CompTIA A+ 220-1102

Remote access tools let A+ technicians support users without being physically present. CompTIA A+ 220-1102 tests RDP, SSH, VNC, remote monitoring tools, and best practices for secure remote support. This guide covers every remote access tool and concept in the A+ Core 2 objectives.

9
5 sections · 8 exam key points
1 practice questions

Remote Desktop Protocol (RDP)

RDP (Remote Desktop Protocol): Microsoft's protocol for remote desktop access to Windows computers. Port: TCP 3389 (and UDP 3389 for enhanced performance). Enables: full graphical desktop access, remote file transfer, remote printing, remote audio. Enable RDP: System Properties → Remote → Allow remote connections to this computer. Requires: user must be in the Remote Desktop Users group or be an administrator. Windows Home: cannot accept incoming RDP connections (can initiate outgoing). Windows Pro/Enterprise: can accept RDP. mstsc.exe: Remote Desktop Connection client (built into all Windows editions). Options: display resolution, local device redirection (printers, drives, clipboard), performance settings, RemoteApp. Security: RDP is frequently targeted by attackers. Best practices: use NLA (Network Level Authentication) — requires authentication before desktop loads (more efficient, more secure). Change default port from 3389. Use VPN and only allow RDP over VPN. Use strong passwords + MFA on RDP accounts. Restrict who can RDP (specific user groups). Enable RDP Gateway for internet-facing RDP.

SSH (Secure Shell)

SSH: encrypted protocol for command-line remote access. Primarily used for Linux/Unix/macOS servers. Port: TCP 22. Replaces insecure Telnet (port 23 — plaintext). Windows SSH: Windows 10/11 include an optional SSH client (OpenSSH) and server. Enable: Settings → Apps → Optional Features → Add a feature → OpenSSH Client / OpenSSH Server. SSH usage: `ssh username@hostname` or `ssh username@IP`. Key-based authentication: more secure than passwords. `ssh-keygen` generates a key pair. `ssh-copy-id user@host` copies public key to server. Private key remains on client — used to authenticate without typing a password. SSH tunnel (port forwarding): encrypts traffic for other protocols through an SSH tunnel. SCP (Secure Copy Protocol): `scp file.txt user@host:/path` — copies files over SSH. SFTP (SSH File Transfer Protocol): graphical or command-line FTP-like file transfer over SSH. FTPS ≠ SFTP: FTPS is FTP with TLS. SFTP is a completely different protocol over SSH.

VNC (Virtual Network Computing)

VNC: cross-platform remote desktop protocol. Uses RFB (Remote Framebuffer) protocol. Port: TCP 5900 (first display), 5901, 5902, etc. (additional displays). Not native to Windows — requires VNC server software (RealVNC, TigerVNC, TightVNC, UltraVNC). Cross-platform: VNC clients and servers available for Windows, macOS, Linux, Android, iOS. Security: base VNC protocol has weak encryption — use SSH tunneling or VPN for secure VNC access. VNC server on macOS: macOS includes a built-in VNC server via Screen Sharing (System Preferences → Sharing → Screen Sharing). Third-party VNC viewers required on Windows to connect to macOS screen sharing. Use cases: non-Windows remote desktop (Linux/macOS), embedded systems with VNC server, cross-platform environments.

Commercial Remote Support Tools

TeamViewer: popular commercial remote access tool. No firewall configuration needed (works through NAT/firewall via relay). Uses ID numbers instead of IP addresses. Encrypted with AES-256. Free for personal use; commercial license required for business. End user can share their session ID for unattended or attended support. Zoom Remote Control: participants in a Zoom meeting can request or grant remote control. Microsoft Quick Assist: built into Windows 10/11. Two users connect; one shares a code that the other enters. The helper then has remote control. Settings → Get help or search 'Quick Assist'. AnyDesk: lightweight alternative to TeamViewer. Remote Assistance (Windows): older Windows feature — user sends invitation file (RA file) or easy connect code; support takes control. Replaced by Quick Assist in modern Windows. Apple Screen Sharing / Remote Desktop: for macOS environments.

Remote Access Security

RDP attacks: brute force login attempts against exposed RDP (port 3389) are extremely common — many ransomware infections start via compromised RDP. Countermeasures: require MFA for RDP. Use VPN — only allow RDP from VPN IP range. Enable account lockout policy (5 failed attempts → lockout). Change RDP port (minor obscurity). RDP Gateway: Microsoft's secure gateway for RDP — acts as a HTTPS (port 443) proxy for RDP connections. Users authenticate to the gateway first; gateway relays to internal computers. Telnet: plaintext protocol (port 23) — never use for administration. Replace with SSH. Least privilege for remote accounts: service accounts used for automated access should have minimal permissions. Session recording: enterprise remote access tools should log and record sessions for audit. Remote desktop firewall rules: scope RDP rules to specific IP ranges (firewall → inbound → RDP → Scope: [specific IPs]).

Key exam facts — A+

  • RDP: port 3389, Windows-native, requires Pro/Enterprise to receive connections
  • SSH: port 22, encrypted command-line access, replaces Telnet (port 23)
  • Enable NLA (Network Level Authentication) for RDP — authenticates before desktop loads
  • VNC: cross-platform, port 5900, requires third-party software on Windows
  • Quick Assist: built into Windows 10/11 for remote support (replaces Remote Assistance)
  • TeamViewer: no firewall/NAT configuration needed, works via relay
  • RDP brute force is a major attack vector — require MFA, use VPN, enable lockout
  • SCP and SFTP transfer files securely over SSH

Common exam traps

Practice questions — Remote Access Tools

These questions are representative of what you will see on A+ exams. The correct answer and explanation are shown immediately below each question.

Q1.

A.A. mstsc.exe (Remote Desktop Connection)
B.B. VNC Viewer
C.C. SSH client (OpenSSH or PuTTY)
D.D. Quick Assist

Explanation: SSH (Secure Shell) is the standard for secure remote command-line access to Linux/Unix servers. Windows 10/11 include an OpenSSH client. PuTTY is a popular free SSH client for Windows.

Frequently asked questions — Remote Access Tools

What is the difference between Remote Desktop (RDP) and Quick Assist?

RDP provides full unattended access to a remote desktop — you connect and control the PC as if sitting in front of it (the user can be logged off). Quick Assist requires an active session code shared by the user, provides attended support (user can see everything you do), and is designed for temporary support scenarios. RDP is for permanent remote access; Quick Assist is for one-time support sessions.

Practice this topic

Test yourself on Remote Access Tools

JT Exams routes you to questions in your exact weak areas — automatically, after every session.

No credit card · Cancel anytime

Related certification topics