Which authentication method should you configure inthe connection security rule?

You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network
communications across the Internet to a computer atanother company.
Which authentication method should you configure inthe connection security rule?

You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network
communications across the Internet to a computer atanother company.
Which authentication method should you configure inthe connection security rule?

A.
Advanced

B.
User (Kerberos V5)

C.
Computer (Kerberos V5)

D.
Computer and user (Kerberos V5)

E.
Default



Leave a Reply 2

Your email address will not be published. Required fields are marked *


sneed

sneed

You need to make use of Advanced authentication method to ensure that communication is encrypted over
the network to the other company from your custom connection security rule on Server1.
References:
http://technet.microsoft.com/en-us/library/bb742516.aspx Training Guide: Installing and Configuring Windows
Server 2012 R2, Chapter 8: File Services and Storage, p. 428