Question

Which of the following security procedures often uses digital certificates on end devices, allowing encrypted traffic to be intercepted, decrypted, and inspected by security tools or software before being re-encrypted and forwarded to the intended destination?

answer

Data breach


SSL inspection


Data exfiltration


Public key infrastructure

Answers

GPT-5 mini
SSL inspection — also called TLS/HTTPS inspection. It works by installing a trusted certificate on endpoints so a proxy/firewall can act as a man-in-the-middle: decrypt, inspect, re-encrypt, and forward encrypted traffic.