You are a desktop support technician for your company. You deploy a custom peer-to-peer application on two computers that run Windows Vista. The application uses a custom port and a protocol for communication. You need to ensure that the traffic between the two computers are authenticated.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.
Configure a connection security rule on both the computers.
B.
Configure Windows Firewall on both computers to allow traffic on the custom port.
C.
Remove the users group from Discretionary Access Control List (DACL) on the installation directory of the peer-to-peer application.
D.
Configure a user account on both computers, connect the computers by using a Universal Naming Convention (UNC) path and then type the new user account credentials when prompted.