Windows firewall with advanced security provides a connections security rule called _______________ that enables specified computers to communicate with computers in an isolated domain without authentication
a. Isolation
b. Authentication exemption
c. Server-to-server
d. Tunnel.
B. You can specify computers by IP address ranges or subnets, or you can predefine a set of computers.
Computer Science & Information Technology
You might also like to view...
Understanding professional ethics is a key area of which of the following CBK domains?
A. Physical (environmental) security B. Security architecture and design C. Legal regulations, investigations, and compliance D. Operations security
Computer Science & Information Technology
____ make it possible for someone viewing your document on a computer to jump to other locations in the same document, to other documents, or to websites.
A. Destination links B. Source links C. Hyperlinks D. Credit links
Computer Science & Information Technology