| Exam 300-208 | Question id=1650 | Threat Defense Architectures |
What steps must you perform to deploy a CA-signed identify certificate on an ISE device?
| A. |
1. Download the CA server certificate. 2. Generate a signing request and save it as a file. 3. Access the CA server and submit the ISE request. 4. Install the issued certificate on the ISE. | |
| B. |
1. Download the CA server certificate. 2. Generate a signing request and save it as a file. 3. Access the CA server and submit the ISE request. 4. Install the issued certificate on the CA server. | |
| C. |
1. Generate a signing request and save it as a file. 2. Download the CA server certificate. 3. Access the ISE server and submit the CA request. 4. Install the issued certificate on the CA server. | |
| D. |
1. Generate a signing request and save it as a file. 2. Download the CA server certificate. 3. Access the CA server and submit the ISE request. 4. Install the issued certificate on the ISE. |