This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Choose the best response for each of the questions below.
How does IPsec provide protection from replay attacks?
By using sequence numbers
By using one of several available algorithms to encrypt data
By signing traffic
A connection security rule forces authentication between two peer computers before they can establish a connection and transmit secure information. Windows Defender Firewall with Advanced Security uses IPsec to enforce configurable rules. Which type of connection security rule allows you to protect connections between gateway computers, and typically use it when you are connecting across the Internet between two security gateways?
Server to server
Tunnel
Isolation
As the IT Support professional for Contoso, you want to use the New Connection Security Rule Wizard to create a new rule that specifies how you want authentication to apply to inbound and outbound connections. Which authentication option should you select if you want to specify that all inbound and outbound traffic must authenticate, but that the connection is allowable if authentication fails?
Require authentication for inbound and outbound connections option
Require authentication for inbound connections and Request authentication for outbound connections option
Request authentication for inbound and outbound connections option
As the IT Support professional for Fabrikam, Holly Spencer created firewall rules to allow traffic through the company's firewall. Holly now wants to secure this traffic using IPsec. What must Holly do to secure this traffic with IPsec?
Create connection security rules that apply between the computers that are the two endpoints
Create connection security rules that apply to services
Create connection security rules that apply to programs
Your organization has identified potential weaknesses in its private networks that may make them susceptible to exploitation. As an IT support professional for your organization, you are tasked to implement IPsec. Which of the following items is a feature of IPsec?
IPsec offers self-authentication before and during communications
IPsec has two modes: Basic and Advanced
IPsec provides a private channel for sending and exchanging potentially sensitive or vulnerable data
You must answer all questions before checking your work.
Was this page helpful?
Need help with this topic?
Want to try using Ask Learn to clarify or guide you through this topic?