Connection Security Flashcards

1
Q

Rule Type

A

Specifies the basic function of the rule, such as to isolate computers based on authentication criteria, to exempt certain computers ( such as infrastructure servers) from authentication, to authenticate two specific computers or groups of computers, or to tunnel communications between two computers, as shown in Figure 19-12. You can also create custom rules combining these functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Endpoints

A

Specifies the IP addresses of the computers that establish a secured connection before transmitting any data, as shown in Figure 19-13.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Requirements

A

Specifies whether authentication between two computers should be requested or required. If required, options include requiring authentication for inbound connections only or for both inbound and outbound connections, as shown in Figure 19- 14.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authentication Method

A

Specifies the type of authentication the computers should use when establishing a connection,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly