Your company requires computers to authenticate to one another and enforces this requirement with Windows Defender Firewall with advanced security rules. You are asked to customize exceptions based on specific IP ranges. This can be done with a(n) _____ connection security rule.
a. server-to-server
b. outbound
c. authentication exemption
d. isolation
e. inbound

Respuesta :

There are a lot of rules in computing. The above can be done with authentication exemption.

What is Authentication exemptions?

This is a method that helps one to be able to specify a particular group of computers.

Conclusively, This can be done via their Active Directory computer account name or the use of their IP address. Tis does not apply to existing connection security rules.

Learn more about   authentication exemption from

https://brainly.com/question/25739714