Joe, a security technician, is configuring two new firewalls through the web on each. Each time Joe connects, there is a warning message in the browser window about the certificate being untrusted. Which of the following will allow Joe to configure a certificate for the firewall so that firewall administrators are able to connect both firewalls without experiencing the warning message?

A. Apply a permanent override to the certificate warning in the browser
B. Apply a wildcard certificate obtained from the company's certificate authority
C. Apply a self-signed certificate generated by each of the firewalls
D. Apply a single certificate obtained from a public certificate authority


Answer: C. Apply a self-signed certificate generated by each of the firewalls

Computer Science & Information Technology

You might also like to view...

Which of the following statements are correct?

a. A Visual Studio project is a container that holds a solution. b. A Visual Studio project may have multiple solutions. c. A Visual Studio project must belong to a solution. d. Both A and B are correct.

Computer Science & Information Technology

Kerberos uses which of the following?

A. Symmetric key cryptography B. Asymmetric key cryptography C. Federated identity D. All the above

Computer Science & Information Technology

In the context of Information Technology Infrastructure Library, _____ provides a means for an information technology (IT) organization to measure and improve the service levels.

a. continual transition improvement b. continual process improvement c. service strategy d. service operation

Computer Science & Information Technology

Which of the following best describes the‘’AAA’’ priority business function of a firm?

a. This business function, while significant, can be unavailable for up to a few days without causing severe problems. b. This business function is critical to the operation of the firm and cannot be unavailable for more than a few hours without causing severe problems. c. This business function is extremely critical to the operation of the firm and cannot be unavailable for more than a few minutes without causing severe problems. d. This business function can be unavailable for several days in times of a major disaster without causing major problems.

Computer Science & Information Technology