A company's IT security policy requires that all network traffic must be secure, and no web browser certificate error warnings should be accepted by end users.
An administrator is tasked with configuring Objects so that it uses a certificate from an internal Certificate Authority (CA),
How should the administrator configure Objects to meet the security policy?
Submit