Which of the following is TRUE with regards to connecti…

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com
network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

You work as a senior administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com
network have Windows Server 2012 R2 installed.
You are running a training exercise for junior administrators. You are currently discussing connection security rules.
Which of the following is TRUE with regards to connection security rules? (Choose all that apply.)

A.
Connection security rules allows for traffic to be secured via IPsec.

B.
Connection security rules do not allow the traffic through the firewall.

C.
Connection security rules are applied to programs or services.

D.
Connection security rules are applied between two computers.

Explanation:
Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers.
Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data
integrity, and, optionally, data encryption.
How firewall rules and connection security rules are related
Firewall rules allow traffic through the firewall, but do not secure that traffic. To secure traffic with IPsec, you can create Computer Connection Security rules.
However, the creation of a connection security rule does not allow the traffic through the firewall. You must create a firewall rule to do this, if the traffic is not allowed
by the default behavior of the firewall. Connection security rules are not applied to programs or services; they are applied between the computers that make up the
two endpoints.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


A

A

A: Connection security rules use IPsec to secure traffic
https://technet.microsoft.com/en-us/library/cc753558.aspx

B:To secure traffic with IPsec, you can create connection security rules. However, the creation of a connection security rule does not allow the traffic through the firewall.

D:Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers