What actions can be specified for a Windows firewall rule?
What will be an ideal response?
When you define the actions for a rule you can specify:
* Allow the connection-This option allows connections based on this rule.
* Allow the connection if it is secure-This option allows connections based on this rule only when an IPsec connection is configured. By default, this option requires that IPsec authenticates the connection and ensures integrity. However, you also have the option to require data encryption. Additionally, because a secure connection is based on an IPsec rule, you can select to have this rule override other block firewall rules.
* Block the connection-This option denies all connections based on this rule. However, a rule with this option selected can be overridden by another rule that allows only secure connections.
You might also like to view...
Which backup scheme reduces the amount of downtime to perform a restore but creates additional IT management and physical resource overhead?
A. Full database backup plus differential database backup plus multiple transaction log backups B. Single transaction log backup plus full database backup C. Full database backup plus multiple transaction log backups D. Single transaction log backup plus simple recovery model
What functions as the name of a wireless network?
A. secure key B. MAC address C. Network ID D. SSID
With regard to Web design, ____________________ refers to the quality and ease of use of a Web site by people who use assistive devices or by people with disabilities.
Fill in the blank(s) with the appropriate word(s).
List four I/O tasks performed by an operating system.
What will be an ideal response?