Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

During the implementation of SSL Forward Proxy decryption, an administrator imports the company’s Enterprise Root CA and Intermediate CA certificates onto the firewall. The company’s Root and Intermediate CA certificates are also distributed to trusted devices using Group Policy and GlobalProtect. Additional device certificates and/or Subordinate certificates requiring an Enterprise CA chain of trust are signed by the company’s Intermediate CA.

Which method should the administrator use when creating Forward Trust and Forward Untrust certificates on the firewall for use with decryption?

A. Generate a single subordinate CA certificate for both Forward Trust and Forward Untrust.

B. Generate a CA certificate for Forward Trust and a self-signed CA for Forward Untrust.

C. Generate a single self-signed CA certificate for Forward Trust and another for Forward Untrust

D. Generate two subordinate CA certificates, one for Forward Trust and one for Forward Untrust.

Answer: B

Latest PCNSE Dumps Valid Version with 280 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments