The firewall administrator is adding a new certificate for the company's remote access solution. The solution requires that the uploaded file contain the entire certificate chain for the certificate to load properly. The administrator loads the company certificate and the root CA certificate into the file. The file upload is rejected.Which of the following is required to complete the certificate chain?

A. Certificate revocation list
B. Intermediate authority
C. Recovery agent
D. Root of trust

Answer: B. Intermediate authority

Computer Science & Information Technology

You might also like to view...

Dragging or sizing affects only a ____.

A. collection of objects B. regrouped object C. ungrouped object D. selected object

Computer Science & Information Technology

In a university environment how might the user access classes “owner,”“group,”“specified user,” and “public” be used to control access to files? Consider the use of the computer system for administrative as well as academic computing. Consider also its use in support of grant research as well as in academic courses.

What will be an ideal response?

Computer Science & Information Technology