Knowledge check

Completed

Choose the best response for each of the questions below. Then select Check your answers.

Check your knowledge

1.

How does IPsec provide protection from replay attacks?

2.

A connection security rule forces authentication between two peer computers before they can establish a connection and transmit secure information. Windows Defender Firewall with Advanced Security uses IPsec to enforce configurable rules. Which type of connection security rule allows you to protect connections between gateway computers, and typically use it when you are connecting across the Internet between two security gateways?

3.

As the IT Support professional for Contoso, you want to use the New Connection Security Rule Wizard to create a new rule that specifies how you want authentication to apply to inbound and outbound connections. Which authentication option should you select if you want to specify that all inbound and outbound traffic must authenticate, but that the connection is allowable if authentication fails?

4.

As the IT Support professional for Fabrikam, Holly Spencer created firewall rules to allow traffic through the company's firewall. Holly now wants to secure this traffic using IPsec. What must Holly do to secure this traffic with IPsec?

5.

Your organization has identified potential weaknesses in its private networks that may make them susceptible to exploitation. As an IT support professional for your organization, you are tasked to implement IPsec. Which of the following items is a feature of IPsec?