Question

A security engineer wants to add SSL to the public web server. Which of the following would be


A. Download the web certificate
B. Install the intermediate certificate
C. Generate a CSR
D. Encrypt the private key

A security engineer wants to add SSL to the public web server. Which of the following would be the On Download the web certif

0 0
Add a comment Improve this question Transcribed image text
✔ Recommended Answer
Answer #1

Here is your answer ::

If you want to add SSL to the public web server , you need to follow the steps below

Generally SSL certificate is used to secure the information that is being shared between the browser and the server , so that no one can access/steal the information.

Once you activate SSL , HTTPS will be displayed on your browser URL Eg:: " https://www.google.com " , which indicates that your website is encrypted and communications are secured.

Steps Followed to add SSL to Public Web Server ::

1. Purchase SSL certificate ::

   Firstly, you need to purchase SSL certificate from the providers.

2. Generate CSR and Private Key ::

   After purchasing SSL certificate , you need to generate CSR ( Certificate Signing Request ). This can be generated using a CSR tool which is available online.
   After Generating CSR you will have the Private Key.

So ' Generate a CSR ' will be the valid answer ......

After generating a CSR , you need to complete the entire process to get access to the SSL certificate to your web server.

Add a comment
Know the answer?
Add Answer to:
A security engineer wants to add SSL to the public web server. Which of the following...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • 8:38 A software developer wants to ensure that the application is verifying that a key is...

    8:38 A software developer wants to ensure that the application is verifying that a key is valid before establishing SSL connections with random remote hosts on the Internet. Which of the following should be used in the code? (Select TWO.) A. Escrowed keys B. SSL symmetric encryption key C. Software code private key D. Remote server public key A Chief Information Security Officer (CISO) for a school district wants to enable SSL to protect all of the public-facing servers in...

  • Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the...

    Joe, a user, wants to send Ann, another user, a confidential document electronically. Which of the following should Joe do to ensure the document is protected from eavesdropping? A. Encrypt it with Joe's private key B. Encrypt it with Joe's public key C. Encrypt it with Ann's private key D. Encrypt it with Ann's public key

  • A network security engineer is tasked with blocking all external connection attempt from the internet to...

    A network security engineer is tasked with blocking all external connection attempt from the internet to the /admin directory in a web application that uses TLSv1.2, but must continue to allow access to the rest of the site. Which of the following controls should the engineer apply to fulfill the requirement? A Add an IPS signature to block any session requesting resources from /admin B Add a rule in the /admin web server directory to deny from all. C Add...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True...

    Information Security Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False Question 4 (1 point) In general, private key encryption is safer than public key encryption. Question 4 options: True False Question 5 (1 point) TLS will encrypt TCP/IP transmissions. Question 5...

  • 41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition...

    41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition D. Shift 42. Which encryption algorithm can have key sizes of 128, 192, and 256 bits, with the key size affecting the number of rounds used in the algorithm? A. SHA B. RC С. AES D. DES 43. Which of the following security principles ensures that the sender and the recipient of a message are informed that the message was not altered in transmission?...

  • A server has the roles Domain Controller, Application Server, File Server, Web Server and Print Server....

    A server has the roles Domain Controller, Application Server, File Server, Web Server and Print Server. Some users have been complaining that the server is getting too slow. After monitoring the performance of this server the following metrics were observed: • Processor:%Processor time = 90% • Memory:%Committed bytes in use = 75% • Physical Disk:%Idle time = 25% • Logical Disk: % Free space = 20% Which of the following would best resolve this situation?    1.Add more RAM   ...

  • While reviewing web server logs, a security analyst notices the following code: Which of the following...

    While reviewing web server logs, a security analyst notices the following code: Which of the following would prevent this code from performing malicious actions? (choose one and why) Performing web application penetration testing Requiring the application to use input validation Disabling the use of HTTP and requiring the use of HTTPS Installing a network firewall in front of the application GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org GET http://testphp.comptia.org/profiles.php?id=-1 UNION SELECT 1, 2, 3 HTTP/1.1 Host: testphp.comptia.org

  • Web servers are compromised for a number of reasons which may include any of the following:...

    Web servers are compromised for a number of reasons which may include any of the following: Improper file or directory permissions, installing the server with default settings, unnecessary services enabled, security conflicts, a lack of proper security policies, improper authorization with external systems, default accounts with default or no passwords, unnecessary default, backup, or sample files, misconfigurations, bugs in server software, OS, or web applications, misconfigured SSL certificates and encryption settings, administrative or debugging functions that are enabled or accessible...

  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT