Matching
Match each item with a statement below.
Premises:
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
This template creates rules that restrict network connections based on administrator-defined policies.
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Responses:
Custom
Server-to-Server
GPME
Authentication Exemption Rule
Isolation
WFAS
IP Security Policy snap-in
Netsh
Tunnel
Correct Answer:
Premises:
Responses:
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
This template creates rules that restrict network connections based on administrator-defined policies.
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Premises:
This command-line utility allows administrators to perform all the GUI-based tasks of certain other tools, along with other advanced configurations that are available only through it.
This template creates rules for authenticating communication between two computers, two groups of computers, two different subnets, or a combination of these.
This console is used to create IPSec policies running Windows Vista and Windows Server 2008 as well as older OSs.
This console will allow you to create policies for IPSec services so that they can be applied to computer objects within your Active Directory environment.
This template creates rules that restrict network connections based on administrator-defined policies.
Not necessarily a template, this wizard allows administrators to create rules requiring specific settings and functionality not covered by the four default templates.
This console allows for the configuration of IPSec security services for Windows Server 2008 and Windows Vista clients only.
This template creates rules for authenticating communications between gateway computers, such as IPSec VPNs.
This template creates rules that allow specific computers, groups, or IP addresses to connect with network computers without being required to authenticate themselves.
Responses:
Related Questions
Q32: Match each item with a statement below.
Q33: Briefly discuss the three scenarios available when
Q34: For each transaction, IPSec uses the _
Q35: Windows Server 2008 has two tools for
Q36: Windows Firewall does not allow you to
Q38: A(n) _ attack involves placing a computer
Q39: EFS uses a combination of private and
Q40: What are the limitations of BitLocker?
Q41: _ provides hard drive-based encryption of servers
Q42: IPSec's _ provides secure communications between two