exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 69 discussion

Actual exam question from CompTIA's CAS-004
Question #: 69
Topic #: 1
[All CAS-004 Questions]

A company is moving most of its customer-facing production systems to the cloud-facing production systems to the cloud. IaaS is the service model being used.
The Chief Executive Officer is concerned about the type of encryption available and requires the solution must have the highest level of security.
Which of the following encryption methods should the cloud security engineer select during the implementation phase?

  • A. Instance-based
  • B. Storage-based
  • C. Proxy-based
  • D. Array controller-based
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
bobthemanofearth
Highly Voted 2 years, 10 months ago
B. We recommend that you encrypt your virtual hard disks (VHDs) to help protect your boot volume and data volumes at rest in storage, along with your encryption keys and secrets. Azure Disk Encryption helps you encrypt your Windows and Linux IaaS virtual machine disks. Azure Disk Encryption uses the industry-standard BitLocker feature of Windows and the DM-Crypt feature of Linux to provide volume encryption for the OS and the data disks. The solution is integrated with Azure Key Vault to help you control and manage the disk-encryption keys and secrets in your key vault subscription. The solution also ensures that all data on the virtual machine disks are encrypted at rest in Azure Storage. https://docs.microsoft.com/en-us/azure/security/fundamentals/iaas
upvoted 11 times
...
Mr_BuCk3th34D
Highly Voted 2 years ago
Selected Answer: B
Since we're talking about IaaS we can promptly discard D, array controller-based, since this is encryption at hw level, and in most cases is not an option for cloud providers. Storage-based encryption involves encrypting data at rest, such as data stored on hard drives or in cloud storage. This is typically done using encryption keys that are managed by the cloud provider or by the customer. This method of encryption provides a high level of security, as it protects data from unauthorized access even if an attacker gains physical access to the storage media. Instance-based encryption involves encrypting data in transit, such as data transmitted over a network or the internet. While this method can provide some level of security, it is not as secure as storage-based encryption, as it does not protect data when it is at rest. Proxy-based encryption involves using a proxy server to encrypt data in transit. This method is similar to instance-based encryption, but it uses an additional layer of security by routing data through a secure server. However, it is still not as secure as storage-based encryption.
upvoted 9 times
...
231354b
Most Recent 4 weeks, 1 day ago
Selected Answer: B
Storage-based is highest encryption option for IaaS solutions.
upvoted 2 times
...
deeden
1 month, 3 weeks ago
Selected Answer: A
Instance-based encryption provides the highest level of security because encryption is applied at the compute instance level, ensuring that data is encrypted as it is processed, stored, or transmitted. This method enables fine-grained control over encryption keys and ensures that data is encrypted as close to the source as possible, reducing the risk of exposure during data handling. Storage-based: Encryption is applied at the storage layer, protecting data at rest but leaving it vulnerable during processing or transmission.
upvoted 2 times
deeden
1 month, 3 weeks ago
you can use instance-based encryption in an IaaS, and it is commonly implemented for securing workloads in such environments. Why Instance-Based Encryption Works in IaaS: Control of VMs Encryption at the Compute level Customer-Managed Keys Examples of Instance-Based Encryption in IaaS: AWS: Using AWS KMS with EC2 instances for encrypting EBS volumes attached to the instance. Azure: Encrypting VMs with Azure Disk Encryption, backed by Azure Key Vault. Google Cloud: Encrypting persistent disks attached to Compute Engine instances using customer-supplied encryption keys.
upvoted 1 times
...
...
IT_Master_Tech
2 months, 1 week ago
Highest encryption for data at rest on cloud infrastructure.
upvoted 1 times
...
23169fd
6 months ago
Selected Answer: B
Instance-base may not cover all data at rest comprehensively, especially if data is moved outside the instance.
upvoted 4 times
...
cyspec
6 months, 2 weeks ago
Selected Answer: A
Can't find relevant information on "storage-based" encryption.
upvoted 1 times
...
loucrass
8 months, 3 weeks ago
Selected Answer: B
The correct answer is Storage based or B
upvoted 3 times
...
surfuganda
9 months, 1 week ago
Selected Answer: B
B. Storage-based encryption: Storage-based encryption involves encrypting data at the storage level, typically at the disk or volume level. In this approach, data is encrypted before it is written to disk, ensuring that it remains encrypted while at rest. Storage-based encryption offers comprehensive protection for data stored on disk, regardless of the specific instances or VMs accessing the storage. By encrypting data at the storage level, organizations can ensure that data remains protected both at rest and during transmission, providing robust security for customer-facing production systems. This approach is well-suited for IaaS environments as it provides a centralized and consistent method for securing data across multiple instances or VMs.
upvoted 3 times
...
Delab202
1 year ago
Selected Answer: B
For the highest level of security in an IaaS (Infrastructure as a Service) cloud environment, where customer-facing production systems are being moved, the most appropriate encryption method would be: B. Storage-based Storage-based encryption typically involves encrypting the data at rest within the storage infrastructure. This ensures that the data stored in the cloud storage, such as block storage or object storage, is protected by encryption. It provides a robust level of security for sensitive data and helps prevent unauthorized access to the stored information.
upvoted 3 times
...
Anarckii
1 year ago
Selected Answer: B
B. Storage-based Storage-based encryption involves encrypting data at the storage level, ensuring that data remains protected whether it is at rest or in transit.
upvoted 3 times
...
OdinAtlasSteel
1 year, 1 month ago
Selected Answer: B
In the context of the highest level of security for encryption in a cloud environment, while instance-based encryption can provide security for data in transit or during processing within specific instances, it's important to note that the highest level of security for data protection in a cloud environment is generally achieved through storage-based encryption. Storage-based encryption focuses on encrypting data at rest, meaning the data stored within the cloud storage is encrypted. This method ensures that even if someone gains unauthorized access to the stored data, they won't be able to interpret or access it without the necessary decryption keys.
upvoted 3 times
...
strong1
1 year, 3 months ago
B: for the highest level of security in an IaaS environment when moving customer-facing production systems to the cloud, you should prioritize data encryption at rest. Therefore, options B (Storage-based) and D (Array controller-based) are the most relevant choices, with the specific choice depending on your cloud provider and infrastructure setup.
upvoted 2 times
...
imather
1 year, 5 months ago
Selected Answer: A
A. Instance based storage protects against physical loss or theft, external administrator(s) accessing the storage, snapshots and storage-level backups being taken and removed from the system. Storage-based only protects against hardware theft or less, so Instance based is a higher level of security https://cloudgal42.com/cloud-data-encryption-architecture-and-options/ https://www.worthinlife.com/what-is-cloud-storage-encryption/
upvoted 5 times
...
BiteSize
1 year, 5 months ago
Selected Answer: A
Instance-Based encryption is the highest level of security available for an IaaS. Luckily, they are in the implementation phase and can configure it that way from the start. It would be difficult to change later on. Source: Verifying against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 5 times
...
CASP_Master
1 year, 8 months ago
I would recommend using instance-based encryption for the company's customer-facing production systems in the cloud. Instance-based encryption is a method of encryption that encrypts the data at the virtual machine level before it is sent to the storage device, ensuring the highest level of data security. This method provides end-to-end encryption for data at rest, and it allows the company to maintain control over its encryption keys. Additionally, instance-based encryption is well-suited for IaaS environments as it does not require any modifications to the storage system itself, and it can be implemented easily in the virtual machine images.
upvoted 5 times
...
p1s3c
1 year, 8 months ago
Selected Answer: B
Based on the options provided, the most relevant encryption method for an IaaS cloud environment would be storage-based encryption. This method provides encryption of data at rest, which can help ensure the confidentiality of sensitive information stored in the cloud environment. Instance-based encryption only encrypts data in transit, while proxy-based and array controller-based encryption are not typically used in IaaS environments. However, it's important to note that encryption alone may not be sufficient to ensure the security of a cloud environment, and other security measures such as access control, monitoring, and vulnerability management should also be implemented.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago