Windows firewall with advanced security provides a connections security rule called _______________ that enables specified computers to communicate with computers in an isolated domain without authentication

a. Isolation
b. Authentication exemption
c. Server-to-server
d. Tunnel.

B. You can specify computers by IP address ranges or subnets, or you can predefine a set of computers.

Computer Science & Information Technology

You might also like to view...

Understanding professional ethics is a key area of which of the following CBK domains?

A. Physical (environmental) security B. Security architecture and design C. Legal regulations, investigations, and compliance D. Operations security

Computer Science & Information Technology

____ make it possible for someone viewing your document on a computer to jump to other locations in the same document, to other documents, or to websites.

A. Destination links B. Source links C. Hyperlinks D. Credit links

Computer Science & Information Technology