多项选择题

A.Connection security rules allows for traffic to be secured via IPsec.
B.Connection security rules do not allow the traffic through the firewall.
C.Connection security rules are applied to programs or services
D.Connection security rules are applied between two computers.

相关考题

多项选择题 You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()

单项选择题 You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers in the ABC.com domain, including domain controllers, have Windows Server 2012 R2 installed.ABC.com has a server, named ABC-SR15, which is configured as a file server. You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ABC-SR15 via Windows Server Backup.   Which of the following actions should you take?()

单项选择题 You work as an administrator at ABC.com. The ABC.com network consists of two Active Directory  forests, named ABC.com and test.com. There is no trust relationship configured between the forests.A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the ABC.com domain. You are informed that a GPO must be created in the ABC.com domain, and must be based on the settings of the GPO in the test.com domain. You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet.You want to complete the task via a Windows PowerShell cmdlet.  Which of the following actions should you take?()