Which of the following is TRUE with regards to connection security rules?

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single
domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012
R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection
security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single
domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012
R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection
security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

A.
Connection security rules allows for traffic to be secured via IPsec.

B.
Connection security rules do not allow the traffic through the firewall.

C.
Connection security rules are applied to programs or services.

D.
Connection security rules are applied between two computers.

Explanation:
Connection security involves the authentication of two computers before they begin
communications and the securing of information sent between two computers. Windows Firewall
with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by
using key exchange, authentication, data integrity, and, optionally, data encryption.
How firewall rules and connection security rules are related
Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with
IPsec, you can create Computer Connection Security rules. However, the creation of a connection
security rule does not allow the traffic through the firewall. You must create a firewall rule to do this,
if the traffic is not allowed by the default behavior of the firewall. Connection security rules are not
applied to programs or services; they are applied between the computers that make up the two
endpoints.



Leave a Reply 3

Your email address will not be published. Required fields are marked *


Sacha

Sacha

Thank you!!! 🙂

a.l.i

a.l.i

Except for this one