Users are getting untrusted server warnings when they connect to the URL https://asa.lab from their browsers. This URL resolves to 192.168.10.10, which is the IP address for a Cisco ASA configured for a clientless VPN. The VPN was recently set up and issued a certificate from an internal CA server. Users can connect to the VPN by ignoring the message, however, when users access other webservers that use certificates issued by the same internal CA server, they do not experience this issue. Which action resolves this issue? A. Import the CA that signed the certificate into the machine trusted root CA store. B. Reissue the certificate with asa.lab in the subject alternative name field. C. Import the CA that signed the certificate into the user trusted root CA store. D. Reissue the certificate with 192.168.10.10 in the subject common name field. Â Suggested Answer: C This question is in 300-730 Implementing Secure Solutions with Virtual Private Networks (SVPN) Exam For getting Cisco Certified Network Professional Security (CCNP Security) Certificate Disclaimers: The website is not related to, affiliated with, endorsed or authorized by Cisco. Trademarks, certification & product names are used for reference only and belong to Cisco. The website does not contain actual questions and answers from Cisco's Certification Exam.
Please login or Register to submit your answer