An accountant is attempting to log in to the internal accounting system and receives a message that the website’s certificate is fraudulent. The accountant finds instructions for manually installing the new trusted root onto the local machine.
Which of the following would be the company’s BEST option for this situation in the future?
A . Utilize a central CR
C . Implement certificate management.
D . Ensure access to KM
F . Use a stronger cipher suite.
Answer: B