exam questions

Exam 350-901 All Questions

View all questions & answers for the 350-901 exam

Exam 350-901 topic 1 question 155 discussion

Actual exam question from Cisco's 350-901
Question #: 155
Topic #: 1
[All 350-901 Questions]

A team of developers created their own CA and started signing certificates for all of their IoT devices.
Which action will make the browser accept these certificates?

  • A. Install a TLS instead of SSL certificate on the IoT devices.
  • B. Set the private keys 1024-bit RSA.
  • C. Preload the developer CA on the trusted CA list of the browser.
  • D. Enable HTTPS or port 443 on the browser.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lente_kriebels
Highly Voted 1 year, 9 months ago
I think answer should be C. Own CA should be in CRL
upvoted 15 times
...
m0nking
Highly Voted 1 year, 5 months ago
Selected Answer: C
the browser needs an CA to trust cert, otherwise there would be a warning.
upvoted 7 times
...
Teringzooi
Most Recent 7 months, 3 weeks ago
Selected Answer: C
Correct answer: C the browser needs an CA to trust cert, otherwise there would be a warning. Or use public signed certificates.
upvoted 2 times
...
designated
9 months ago
Selected Answer: C
C is correct: To obtain and activate its identity certificate, the system’s (website) owner needs to enroll with the CA first. Here’s the process: - The resource’s RSA key pair (public and private) is generated. - A certificate signing request (CSR) containing identity information and the public key is delivered to a CA. Identity details can include data such as the system name, the organization to which the system belongs, and location information. - The CA validates the request. - The CA generates the system’s certificate, which contains these (or more) fields, as per the X.509 standard: - Serial Number, Subject, Public Key, Key Usage, Not Before and Not After, Issuer, Signature Algorithm, Signature. - The certificate is delivered back and installed on a system.
upvoted 2 times
...
QuiShong
11 months, 1 week ago
Selected Answer: C
Voting for C. I assume that the IoT device is accessible over HTTPS and that the manufacturer wants to access from a client.
upvoted 2 times
...
zzrdxakpbkiswhvsyu
1 year, 7 months ago
IoT devices most likely have not a browser at all, so C does not sound good. But A sounds bad as well. A or C but it depends on exact wording. C is better
upvoted 4 times
QuiShong
11 months, 1 week ago
It cannot be A as TLS and SSL certificates are the same thing. A certificate can be used for both TLS and SSL. Note: I'm not saying that TLS and SSL are the same thing.
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago