The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.Which of the following is required to complete the certificate chain?
A. Certificate revocation list
B. Intermediate authority
C. Recovery agent
D. Root of trust
Answer: B. Intermediate authority
You might also like to view...
Which of the following is the shape of an action-state symbol?
a. Diamond. b. Circle. c. Rectangle with left and right sides replaced with arcs curving outward. d. Rounded rectangle.
What are the two virtual hard disk formats? Describe them briefly.
What will be an ideal response?
Which of the following is NOT part of XML?
A) XML declaration B) Element C) Start tag D) Hyperlink
Why is segmentation recommended for network design? That is, what makes it better to have a separate network segment for web servers, one for the back-end office processing, one for testing new code, and one for system management?
What will be an ideal response?