The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.Which of the following is required to complete the certificate chain?

A. Certificate revocation list
B. Intermediate authority
C. Recovery agent
D. Root of trust


Answer: B. Intermediate authority

Computer Science & Information Technology

You might also like to view...

Which of the following is the shape of an action-state symbol?

a. Diamond. b. Circle. c. Rectangle with left and right sides replaced with arcs curving outward. d. Rounded rectangle.

Computer Science & Information Technology

What are the two virtual hard disk formats? Describe them briefly.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is NOT part of XML?

A) XML declaration B) Element C) Start tag D) Hyperlink

Computer Science & Information Technology

Why is segmentation recommended for network design? That is, what makes it better to have a separate network segment for web servers, one for the back-end office processing, one for testing new code, and one for system management?

What will be an ideal response?

Computer Science & Information Technology