An accountant is attempting to log in to the internal accounting system and receives a message that the website’s certificate is fraudulent. The accountant finds instructions for manually installing the new trusted root onto the local machine.
Which of the following would be the company’s BEST option for this situation in the future?
A . Utilize a central CR
C . Implement certificate management.
D . Ensure access to KM
F . Use a stronger cipher suite.
Answer: B
Explanation:
The Certificate Management System (CMS) is a networked system for generation, distribution, storage and verification of certificates for use in a variety of security enhanced applications. The structure of a certificate is defined in the X.509 standard.