The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.Which of the following is required to complete the certificate chain?
A. Certificate revocation list
B. Intermediate authority
C. Recovery agent
D. Root of trust
Answer: B. Intermediate authority
Computer Science & Information Technology
You might also like to view...
Dragging or sizing affects only a ____.
A. collection of objects B. regrouped object C. ungrouped object D. selected object
Computer Science & Information Technology
In a university environment how might the user access classes “owner,”“group,”“specified user,” and “public” be used to control access to files? Consider the use of the computer system for administrative as well as academic computing. Consider also its use in support of grant research as well as in academic courses.
What will be an ideal response?
Computer Science & Information Technology