Security policies

Descripción

(Networking) Microsoft 70-410 Apunte sobre Security policies, creado por kamsz el 13/08/2013.
kamsz
Apunte por kamsz, actualizado hace más de 1 año
kamsz
Creado por kamsz hace más de 10 años
65
0

Resumen del Recurso

Página 1

Connection security involves the authentication of two computers before they begin communications and the securing of information sent between two computers. Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption.

NoteUnlike firewall rules, which operate unilaterally, connection security rules require that both communicating computers have a policy with connection security rules or another compatible IPsec policy.

New Page

Mostrar resumen completo Ocultar resumen completo

Similar

CCNA Answers – CCNA Exam
Abdul Demir
Home networks
johnson8221
ISATAP
kamsz
Single-label names (GlobalNames zone)
kamsz
Authenticated Firewall Bypass
kamsz
DHCP Failover
kamsz
Hardware, Software and Networking
dphillips211
DHCP Relay agent
kamsz
SRV Resource records
kamsz
CHAP
kamsz
2.1.6 Networks
Jake Youd