exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 71 discussion

Actual exam question from ISC's CCSP
Question #: 71
Topic #: 1
[All CCSP Questions]

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

  • A. Kerberos support
  • B. CHAP support
  • C. Authentication
  • D. Encryption
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️
iSCSI does not natively support encryption, so another technology such as IPsec must be used to encrypt communications.

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
lolanczos
1 week, 1 day ago
Selected Answer: D
It's 100% D. Encryption: iSCSI does not provide built-in encryption for data in transit. To secure the data being transmitted, encryption must be handled by external protocols or applications, such as IPsec (Internet Protocol Security) or TLS (Transport Layer Security). These protocols can encrypt the data packets, ensuring confidentiality and integrity during transmission.
upvoted 1 times
...
sweetykaur
2 months, 2 weeks ago
Authentication. When using iSCSI in a cloud environment, authentication must be handled by an external protocol or application to ensure secure connections.
upvoted 1 times
...
globy118
6 months, 2 weeks ago
Selected Answer: B
B. Use CHAP (Challenge Handshake Authentication Protocol) to ensure each host has its own password.
upvoted 1 times
...
ST42
9 months, 4 weeks ago
Data Encryption: the data exchanged between the iSCSI initiator and iSCSI target is not encrypted, which is why an attacker who is able to sniff the data of the wire will also be able to reconstruct the data, or more precisely, the files and directories transferred between the two parties. Additionally, an attacker might also be able to inject his own data into the traffic, thus creating/modifying/deleting arbitrary files on the iSCSI target. To mitigate the risk, the IPsec ought to be used to properly encrypt the communication between the iSCSI endpoints. https://resources.infosecinstitute.com/topics/cloud/iscsi-security-considerations-cloud/
upvoted 1 times
...
akg001
2 years, 7 months ago
D. Encryption
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago