An end-user visitsw...
 
Notifications
Clear all

An end-user visitswith a server certificate Common Name (CN):

1 Posts
1 Users
0 Likes
185 Views
(@leneaveorval)
Noble Member
Joined: 2 years ago
Posts: 705
Topic starter  

A firewall is configured with SSL Forward Proxy decryption and has the following four enterprise certificate authorities (CAs):

i. Enterprise-Trusted-CA, which is verified as Forward Trust Certificate (The CA is also installed in the trusted store of the end-user browser and system.)

ii. Enterprise-Untrusted-CA, which is verified as Forward Untrust Certificate

iii. Enterprise-Intermediate-CA

iv. Enterprise-Root-CA, which is verified only as Trusted Root CA

An end-user visits https://www.example-website.com/ with a server certificate Common Name (CN): www.example-website.com.The firewall does the SSL Forward Proxy decryption for the website and the server certificate is not trusted by the firewall.

The end-user's browser will show that the certificate for www.example-website.comwas issued by which of the following?

  • A . Enterprise-Root-CA which is a self-signed CA
  • B . Enterprise-Intermediate-CA which was, in turn, issued by Enterprise-Root-CA
  • C . Enterprise-Untrusted-CA which is a self-signed CA
  • D . Enterprise-Trusted-CA which is a self-signed CA

Show Answer Hide Answer

Suggested Answer: C

   
Quote

Latest Palo Alto Networks PCNSE Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: