Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

SAP Exam C_C4H450_21 Topic 1 Question 24 Discussion

Actual exam question for SAP's C_C4H450_21 exam
Question #: 24
Topic #: 1
[All C_C4H450_21 Questions]

What happens during SSL/TLS handshake when certificate based authentication is used?Note: There are 3 correct answer to this question.

Show Suggested Answer Hide Answer
Suggested Answer: C, D, E

Contribute your Thoughts:

Janessa
4 months ago
I think during SSL/TLS handshake, the client actually generates a new client certificate to send to the server for authentication.
upvoted 0 times
...
Ma
4 months ago
Yeah, that makes sense. The server needs to validate the client certificate during authentication.
upvoted 0 times
...
Stefania
4 months ago
Hmm, interesting point, So maybe the server requests the client certificate from the client then?
upvoted 0 times
...
Art
4 months ago
I believe the server actually generates a new server certificate during the handshake.
upvoted 0 times
...
Ma
4 months ago
I agree with the client definitely needs the server certificate.
upvoted 0 times
...
Stefania
4 months ago
I think during SSL/TLS handshake, the client requests the server certificate.
upvoted 0 times
...
Lajuana
4 months ago
I think during SSL/TLS handshake, the client actually generates a new client certificate to send to the server for authentication.
upvoted 0 times
...
Martha
4 months ago
Yeah, that makes sense. The server needs to validate the client certificate during authentication.
upvoted 0 times
...
Paris
5 months ago
I think I've got it! C, D, and E are the correct answers. The server requests the client certificate, validates it, and the client requests the server certificate. Simple as that!
upvoted 0 times
...
Cathrine
5 months ago
E is the funniest one, like the server is just going to randomly ask the client for their certificate. What is this, a power move?
upvoted 0 times
Carlota
4 months ago
User3: Maybe it's a way for the server to double check the client's identity.
upvoted 0 times
...
Lavonne
4 months ago
User 2
upvoted 0 times
...
Ciara
4 months ago
User 1
upvoted 0 times
...
Shantell
4 months ago
User2: Yeah, it does seem a bit random for the server to ask for the client's certificate.
upvoted 0 times
...
Crissy
4 months ago
User1: I think E is the funniest option too, like a power move.
upvoted 0 times
...
Angella
4 months ago
B) The server generates a new server certificate
upvoted 0 times
...
Sherita
4 months ago
A) The client generates a new client certificate
upvoted 0 times
...
...
Rosendo
5 months ago
Hmm, interesting point, Jina. So maybe the server requests the client certificate from the client then?
upvoted 0 times
...
Jina
5 months ago
I believe the server actually generates a new server certificate during the handshake.
upvoted 0 times
...
Thurman
5 months ago
A is clearly wrong, the client doesn't generate a new certificate during the handshake. B is also wrong, the server already has its own certificate.
upvoted 0 times
Kimi
5 months ago
E is correct, the server requests the client certificate from the client.
upvoted 0 times
...
Kimi
5 months ago
C is correct, the client requests the server certificate from the server.
upvoted 0 times
...
...
Martha
5 months ago
I agree with Rosendo, the client definitely needs the server certificate.
upvoted 0 times
...
Roy
5 months ago
C and D are definitely correct, but I'm not sure about the other options. I guess we need to read the details of the SSL/TLS handshake process more carefully.
upvoted 0 times
Jolene
4 months ago
E) The server requests the client certificate from the client.
upvoted 0 times
...
Leslee
5 months ago
D) The server validates the client certificate
upvoted 0 times
...
Iesha
5 months ago
C) The client requests the server certificate from the server.
upvoted 0 times
...
...
Rosendo
6 months ago
I think during SSL/TLS handshake, the client requests the server certificate.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77