You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain
named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection security
rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)
A.
Connection security rules allows for traffic to be secured via IPsec.
B.
Connection security rules do not allow the traffic through the firewall.
C.
Connection security rules are applied to programs or services.
D.
Connection security rules are applied between two computers.
Explanation:
Connection security involves the authentication of two computers before they begin communications and the
securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet
Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity,
and, optionally, data encryption.
How firewall rules and connection security rules are related
Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you
can create Computer Connection Security rules. However, the creation of a connection security rule does not
allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed by the
default behavior of the firewall. Connection security rules are not applied to programs or services; they are
applied between the computers that make up the two endpoints.