exam questions

Exam CCSP All Questions

View all questions & answers for the CCSP exam

Exam CCSP topic 1 question 71 discussion

Actual exam question from ISC's CCSP
Question #: 71
Topic #: 1
[All CCSP Questions]

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

  • A. Kerberos support
  • B. CHAP support
  • C. Authentication
  • D. Encryption
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ra1paul
2 weeks, 6 days ago
Selected Answer: D
iSCSI provides methods for data transport and block-level access to storage.
upvoted 2 times
...
MaciekMT
1 month ago
Selected Answer: D
iSCSI (Internet Small Computer Systems Interface) does not natively include encryption for securing data in transit. Instead, encryption must be provided by an external protocol or application, such as: IPsec (Internet Protocol Security): For securing data at the network layer. TLS (Transport Layer Security): For securing application-layer communication. Without encryption, iSCSI traffic is vulnerable to interception and eavesdropping, making external encryption essential for secure deployments in cloud environments.
upvoted 2 times
...
lolanczos
2 months ago
Selected Answer: D
It's 100% D. Encryption: iSCSI does not provide built-in encryption for data in transit. To secure the data being transmitted, encryption must be handled by external protocols or applications, such as IPsec (Internet Protocol Security) or TLS (Transport Layer Security). These protocols can encrypt the data packets, ensuring confidentiality and integrity during transmission.
upvoted 2 times
...
sweetykaur
4 months, 1 week ago
Authentication. When using iSCSI in a cloud environment, authentication must be handled by an external protocol or application to ensure secure connections.
upvoted 1 times
...
globy118
8 months, 2 weeks ago
Selected Answer: B
B. Use CHAP (Challenge Handshake Authentication Protocol) to ensure each host has its own password.
upvoted 1 times
...
ST42
11 months, 3 weeks ago
Data Encryption: the data exchanged between the iSCSI initiator and iSCSI target is not encrypted, which is why an attacker who is able to sniff the data of the wire will also be able to reconstruct the data, or more precisely, the files and directories transferred between the two parties. Additionally, an attacker might also be able to inject his own data into the traffic, thus creating/modifying/deleting arbitrary files on the iSCSI target. To mitigate the risk, the IPsec ought to be used to properly encrypt the communication between the iSCSI endpoints. https://resources.infosecinstitute.com/topics/cloud/iscsi-security-considerations-cloud/
upvoted 1 times
...
akg001
2 years, 9 months ago
D. Encryption
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago