Which three actions should you perform in sequence?

DRAG DROP

You administer desktop computers that run Windows 8 Enterprise and are members of an Active Directory domain.

A new security policy states that all traffic between computers in the research department must be encrypted and authenticated by using Kerberos V5. You need to configure the requested traffic authentication settings by using Windows Firewall with Advanced Settings.

Which three actions should you perform in sequence?

Answer:

Explanation:

(Step 1) In the Windows Firewall with Advanced Security MMC snap-in, right-click Connection Security Rules, and then click New Rule.

(Step 2) On the Rule Type page, click Isolation, and then click Next. (The Kerberos option in step 4 below is available only when you specify an Isolation or Custom rule type.)

On the Requirements page, confirm that Request authentication for inbound and outbound connections selected, and then click Next.

(Step 3) On the Authentication Method page, click Computer and user (Kerberos V5), and then click Next.

On the Profile page, clear the Private and Public check boxes, and then click Next.

On the Name page, type Request Inbound Request Outbound, and then click Finish.

Latest 70-697 Dumps Valid Version with 339 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments