A security analyst is hardening a web server, which should allow a secure certificate-based session using the organization's PKI infrastructure.
The web server should also utilize the latest security techniques and standards.
Given this set of requirements, which of the following techniques should the analyst implement to BEST meet these requirements? (Choose two.)
Click on the arrows to vote for the correct answer
A. B. C. D. E.AC.
To meet the requirements of allowing a secure certificate-based session using the organization's PKI infrastructure and utilizing the latest security techniques and standards, the security analyst should implement the following two techniques:
A. Install an X-509-compliant certificate: An X-509 certificate is a digital certificate that uses the X.509 standard to bind a public key to a user or entity. It is the standard format for public key certificates used in Transport Layer Security (TLS) and Secure Sockets Layer (SSL). Installing an X-509-compliant certificate on the web server will allow the server to establish a secure, encrypted connection with clients using the organization's PKI infrastructure.
C. Enable and configure TLS on the server: TLS is a cryptographic protocol that provides secure communication over the internet. Enabling and configuring TLS on the web server will allow secure communication between the server and clients, ensuring that sensitive information is protected from eavesdropping and tampering. TLS uses X.509 certificates to authenticate the server and establish a secure connection.
B, D, and E are incorrect:
B. Implement a CRL using an authorized C: A Certificate Revocation List (CRL) is a list of digital certificates that have been revoked by the issuing Certificate Authority (CA). Implementing a CRL on the web server would not meet the requirement of allowing a secure certificate-based session using the organization's PKI infrastructure.
D. Install a certificate signed by a public C: Installing a certificate signed by a public CA would not meet the requirement of using the organization's PKI infrastructure.
E. Configure the web server to use a host header: Configuring the web server to use a host header would not meet the requirement of allowing a secure certificate-based session using the organization's PKI infrastructure.