Privileged Remote Access supports which protocols? (Select 2)

Zscaler Essentials Test: Boost your Zscaler knowledge with comprehensive flashcards and multiple choice questions. Understand each concept with detailed hints and explanations.

Privileged Remote Access is designed to facilitate secure connections to remote systems and services, primarily focusing on access protocols that allow administrators to manage and troubleshoot systems effectively.

SSH (Secure Shell) is one of the core protocols in this context due to its widespread use in securely accessing remote machines. It provides strong authentication and encrypts the session, making it a preferred choice for secure command-line access to servers and networking devices. This alignment with secure access practices is fundamental to the concept of Privileged Remote Access.

Similarly, RDP (Remote Desktop Protocol) is another key protocol for remote access. It allows users to connect to another computer and use it as if they were physically present. RDP is especially useful for GUI-based remote management and is a protocol that organizations often utilize for accessing Windows servers and desktops remotely.

By supporting both SSH and RDP, Privileged Remote Access enables robust and secure administrative access across various environments, ensuring that privileged accounts operate in a controlled and trackable manner. The other options, such as CIFS and HTTP/HTTPS, are not primarily used for privileged remote access; CIFS is mainly for file sharing in Windows environments, while HTTP/HTTPS are primarily web protocols rather than remote access protocols.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy