Challenges (Optional)

a. Check the fingerprints for the sites shown in Table 1 but using your web browser’s GUI.
Hints: Find a way to display the fingerprint through the browser’s GUI. Remember:
Google is useful in this exercise, and Windows often refers to the Fingerprint as
Thumbprint.

b. Use the OpenSSL (Part 2, Steps 1 through 3) to check all the fingerprints listed in

Table 1
Reflection
What would be necessary for the HTTPS proxy to work?


The local machine would have to trust the HTTPS proxy blindly. Companies and organizations that
wish to monitor HTTPS traffic achieve this trust by installing the HTTPS proxy’s certificate into the
local machine’s root certificate store. In this scenario, the local machines will trust the HTTPS proxy,
allowing it to decrypt the traffic without any warnings.

Computer Science & Information Technology

You might also like to view...

An effectively formatted worksheet is more approachable and helps readers understand the meaning of values and formulas.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The __________ process involves asking users to prove their identity.

a. authorization b. indexing c. authentication d. accounting

Computer Science & Information Technology

Multiple selections cannot be made from a ListBox control object.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ____ daemon manages printers and print queues.

A. cron B. cupsd C. httpd D. sshd

Computer Science & Information Technology