exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 178 discussion

Actual exam question from CompTIA's CAS-004
Question #: 178
Topic #: 1
[All CAS-004 Questions]

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt that data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

  • A. Key rotation
  • B. Key revocation
  • C. Key escrow
  • D. Zeroization
  • E. Cryptographic obfuscation
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Bright07
6 days, 20 hours ago
Selected Answer: B
After extensive research, I have changed my answer to B. Key Revocation. This is a great question — and this is a classic scenario in security. Let’s break it down quickly: Situation Summary: Keys were leaked publicly. Data was decrypted using those keys. So now, anyone can decrypt that data if they have the keys. The main issue? Compromised keys. B. Key revocation (Best Choice) Revokes the current keys — marks them as untrusted/invalid. This is what you do when keys are compromised or exposed. It ensures no one should use them anymore. BUT A. Key rotation Means replacing old keys with new ones periodically. Good practice, but doesn’t directly respond to already-compromised keys. It's a future-facing action. Final Answer: B. Key revocation
upvoted 1 times
...
iganinja5
1 week, 2 days ago
Selected Answer: B
What good is it to rotate your keys if you don't revoke your old ones?
upvoted 2 times
...
Steel16
1 month, 3 weeks ago
Selected Answer: B
"Key rotation" refers to the practice of periodically replacing an old cryptographic key with a new one at a planned interval, while "key revocation" means immediately invalidating a key, typically done when there is a suspicion of compromise, meaning it should no longer be used even if it's still within its normal lifespan; essentially, rotation is a proactive measure, whereas revocation is a reactive response to a potential security breach.
upvoted 2 times
...
mansamusa
4 months, 1 week ago
Selected Answer: A
Key rotation involves replacing old keys with new ones ensuring continued security of encrypted data. Revocation alone does not protect historical data; it merely prevents the key from being used in the future. Any data already encrypted with that compromised key can still be decrypted by anyone who has access to the key.
upvoted 2 times
...
deeden
4 months, 2 weeks ago
Selected Answer: A
Key rotation involves replacing old keys with new ones ensuring continued security of encrypted data. Revocation alone does not protect historical data; it merely prevents the key from being used in the future. Any data already encrypted with that compromised key can still be decrypted by anyone who has access to the key.
upvoted 2 times
...
Bright07
4 months, 4 weeks ago
Ans A. key Rotation. The security analyst has discovered that the keys have been compromised and are being made publicly available. Since these keys can now be used by unauthorized parties to decrypt the affected data, the first and most effective action would be to rotate the keys. Key rotation involves generating new keys to replace the compromised ones, which ensures that the attacker can no longer use the old keys to decrypt the data. Key rotation is a standard security practice to maintain confidentiality and protect data when keys have been exposed or compromised. While Key revocation refers to the process of invalidating a key, usually through a public key infrastructure (PKI) or certificate authority. However, revocation alone does not necessarily prevent the use of previously compromised keys. It is often used in conjunction with key rotation, but it is not sufficient by itself to secure the data.
upvoted 2 times
...
Pupa3
7 months ago
Key rotation is generally considered a best practice, while key revocation is typically only done if a key is suspected to be compromised. The Key has been compromised. Therefore, key revocation is warranted.
upvoted 2 times
...
HereToStudy
7 months, 1 week ago
Selected Answer: A
key rotation involves revoking the old key after creating a new one
upvoted 2 times
...
ServerBrain
8 months, 2 weeks ago
Selected Answer: B
Key rotation gets people to accept and use a new key; key revocation gets them to not accept the old one. Of course if you revoke the current key you generally want people to rotate into using a new one, but you can want people to rotate into a new key without any particular revocation of the old one.
upvoted 3 times
...
PluDou_111
8 months, 3 weeks ago
Selected Answer: A
This is also a repeat of 201 which does not have key revocation as a possible answer.
upvoted 4 times
...
hb0011
1 year, 3 months ago
Selected Answer: B
I agree with everyone saying there is no way it's E as the data is already obfuscated but I'm not clear on why to choose key revocation over key rotation? Wouldn't they both accomplish the same thing?
upvoted 2 times
...
Ariel235788
1 year, 6 months ago
Selected Answer: B
Discovered your key was compromised? Better revoke and THEN distribute a new key. First step is always to revoke keys.
upvoted 4 times
...
SmokinJoe
1 year, 6 months ago
a hacker has a key stored on a public website, most like private key cuae who cares about the public key, it's shared. Said analyst uses key to decrypt data on website. Most likey his website, So the private key has be stolen and is able to decrypt the data encrypted with the public key of the website. Time for new keys. A.
upvoted 1 times
Ariel235788
1 year, 6 months ago
You've gotta revoke the key first before you can distribute a new one
upvoted 1 times
...
...
CXSSP
1 year, 7 months ago
Selected Answer: B
in this specific scenario, "Cryptographic obfuscation" (option E) might not be the most effective solution. Cryptographic obfuscation typically involves adding complexity to cryptographic algorithms to make them more resistant to attacks. However, in this case, the keys themselves have already been compromised and are available on a public website. This means that the attacker can still use the keys to decrypt the data, regardless of how complex the algorithm is. The best course of action is to invalidate the compromised keys through key revocation (option B), which prevents the attacker from using them to decrypt sensitive data. This is a more direct and effective response to the situation at hand.
upvoted 2 times
...
imather
1 year, 8 months ago
Selected Answer: A
Going against the grain and saying key rotation. The question is how to protect the data that has an exposed key. Obviously, C and D are non-applicable. Cryptographic obfuscation is also not applicable. The data is already encrypted i.e. cryptographically obfuscated. Key revocation is defined as "a process whereby a notice is made available to affected entities that the key should be removed from operational use prior to the end of the established cryptoperiod of that key." In other words, revocation is a notice that this key is no longer valid, not removing the ability for a key to decrypt something it encrypted. A key rotation on the other hand, would re-encrypt the data on the website with new keys, protecting it and preventing the use of the old keys. This is also a repeat of 201 which does not have key revocation as a possible answer. https://csrc.nist.gov/glossary/term/key_revocation https://www.gnupg.org/gph/en/manual/c14.html https://cpl.thalesgroup.com/blog/data-protection/encryption-key-rotation-data-security
upvoted 4 times
...
BiteSize
1 year, 9 months ago
Selected Answer: E
Going with E. DATA is the question. rest is fluff. Source: Verifying each answer against Chat GPT, my experience, other test banks, a written book, and weighing in the discussion from all users to create a 100% accurate guide for myself before I take the exam. (It isn't easy because of the time needed, but it is doing my diligence)
upvoted 1 times
Ariel235788
1 year, 6 months ago
There is no security in obfuscation. Also, you commonly put your source as comparing to ChatGPT. I JUST ran it through... In the scenario where a hacker has discovered some keys and made them available on a public website, and the security analyst was able to successfully decrypt data using those keys, the recommended action to protect the affected data is: B. Key revocation. Key revocation is the process of invalidating compromised or unauthorized keys to prevent their use for decrypting sensitive data. By revoking the compromised keys, the organization ensures that the keys are no longer valid for decrypting data, even if they are in the possession of unauthorized individuals.
upvoted 5 times
...
...
Geofab
2 years ago
Selected Answer: B
yea; its a special question. I am going with B. but yes, it could be E as well
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago