Microsoft Exam Questions

Which authentication method should you configure inthe connection security rule?

You have a server named Server1. Server1 runs Windows Server 2012 and is located in a perimeter network.
You need to configure a custom connection security rule on Server1. The rule must encrypt network
communications across the Internet to a computer atanother company.
Which authentication method should you configure inthe connection security rule?

A.
Advanced

B.
User (Kerberos V5)

C.
Computer (Kerberos V5)

D.
Computer and user (Kerberos V5)

E.
Default