A plus 1002 Sub-objective 4.9

A plus 1002 Sub-objective 4.9 – Given a scenario, use remote access technologies.

Welcome to Exam Notes by CertBlaster! This edition covers 4.9 Given a scenario, use remote access technologies. Let’s get to it!

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002


The Remote Desktop Protocol (RDP) supports Remote Desktop Connections (RDC). The Use of Remote Desktop dates back to Windows NT from the late 1990’s. Remote Desktop and Remote Assistance use the same protocol and allow for Screen share and File share. Both program’s settings are accessed by opening Control Panel, clicking System, and then Advanced system settings. In the System Properties below, observe the Remote Assistance checkbox which enables Remote Assistance connections to the computer. The Advanced Button enables the user to Allow this computer to be controlled remotely. The maximum time a request remains open can be set as well as the operating systems that can use the service. When enabled, the user can send requests for assistance to trusted parties and allow them to troubleshoot any problems while they watch. See these options in the screenshots below:

Remote Assistance

Remote Desktop is enabled in the same settings box shown above. However, this program enables authenticated users to completely control the computer, locking the local PC during the process. This is most effective when users are allowed to work remotely by connecting to their desktop from another location.

Windows Defender Firewall does not automatically allow these connections. In order to allow these connections, open Control Panel and then Windows Defender Firewall. Find the Allow an app or feature through Windows Defender Firewall menu from the upper left panel. If necessary, click the Change settings button. In the example, below these apps are already allowed.

Allow an app or feature through Windows Defender Firewall


The Telnet protocol essentially creates a virtual terminal or command line interface with a remote terminal device. In the beginning, Telnet enabled remote users to access information and even control routers and switches. Telnet uses unencrypted connections so on Linux systems, this insecure connection method has been neglected in favor of the more secure SSH (Secure Shell) that only uses encrypted connections. By default, SSH is enabled in Windows and Telnet is a client app. the Windows Telnet client, which uses SSH. this needs to be enabled from Control Panel.

Third-party tools

On a secure network, consider that Remote Desktop and Remote Assistance require port 3389 (by default) to be opened which poses a security risk. Third-party software eliminates this risk by operating on port 80 through the internet browser. Since the port is already open and secure, other resources do not need to be compromised.

Some third-party apps are free while others require a subscription. Popular apps include GoToMyPC, LogMeIn, and the RemotePC app shown below. In this case, the app must be installed on the remote host and the client. From this page, many remote computers and servers are securely accessible.


Security considerations of each access method

The security aspects of the access methods are covered within the topics above.

Click here for the A+ Practice Test Bundle for A+ Exams 220-1001 & 220-1002


If you have followed all of the posts, you have finished the final A+ 220-1002 test objectives! Quite a lot of ground has been covered over the course of these posts. While we’ve covered each test objective in a (hopefully) digestible manner, please remember that this is not the only tool in your preparation toolkit. Use every resource available to you and master each objective point. Get a copy of the actual A+ test objectives and compare your knowledge against it. Use textbooks and online resources to strengthen your understanding. Take the test only when you are ready.

All of us here wish you the very best!


By continuing to browse this site, you accept the use of cookies and similar technologies that will allow the use of your data by CertBlaster in order to produce audience statistics- see our privacy policy.