Which authentication method should you identify?

Posted by: Pdfprep Category: 70-744 Tags: , ,

Your network contains an Active Directory domain named contoso.com.

The network contains a server named Server1. Server1 is in a workgroup. Server1 contains sensitive data and will be accessed by a domain-joined computer named Computer1. You need to create connection security rules to encrypt the data sent between Server1 and Computer1. You need to identify which authentication method to use for the connection security rules. The solution

must use the most secure method possible.

Which authentication method should you identify?
A . Kerberos V5
B . a computer certificate
C . a preshared key
D . NTLMv2

Answer: A

Explanation:

References:

https://www.sciencedirect.com/topics/computer-science/connection-security-rule https://blogs.msdn.microsoft.com/james_morey/2005/06/20/ipsec-and-certificate-authentication/

Leave a Reply

Your email address will not be published.