Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 42 discussion

Actual exam question from ISC's CISSP
Question #: 42
Topic #: 1
[All CISSP Questions]

The security architect is designing and implementing an internal certification authority to generate digital certificates for all employees. Which of the following is the
BEST solution to securely store the private keys?

  • A. Physically secured storage device
  • B. Trusted Platform Module (TPM)
  • C. Encrypted flash drive
  • D. Public key infrastructure (PKI)
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
oudmaster
Highly Voted 1 year, 11 months ago
Every employee will have a digital certificate. That means every of the them will have a private key stored in his device. The private keys will be stored in the TPM of the users' devices. PKI is a framework and irrelevant to storing the keys.
upvoted 10 times
...
robervalchocolat
Most Recent 2 months, 3 weeks ago
Trusted Platform Module (TPM): A TPM is a hardware-based security module that is typically embedded on the motherboard of a computer system. It provides secure storage for cryptographic keys and other sensitive data. TPMs are designed to be tamper-resistant and can be used to protect against various attacks, including cold boot attacks and physical tampering.
upvoted 1 times
...
isaphiltrick
3 months ago
Selected Answer: B
A Trusted Platform Module (TPM) is a dedicated hardware chip designed to securely store cryptographic keys, including private keys. It provides hardware-based security by protecting the keys from unauthorized access and tampering. TPMs are widely recognized as one of the most secure options for storing private keys, especially within an internal certification authority (CA) environment, where the security of private keys is critical.
upvoted 1 times
...
Hardrvkllr
7 months, 2 weeks ago
B: The key word is, "Store..."
upvoted 2 times
...
eboehm
7 months, 2 weeks ago
For key storage its pretty much always going to be a TPM or HSM. Ima go with A as I think a Physically secure storage device is just another name for HSM
upvoted 1 times
...
8b48948
8 months, 3 weeks ago
The question states nothing to do with the devices being laptops. VMs dont have TPMs neither do desktops, so how could it be TPM.
upvoted 1 times
eboehm
7 months, 2 weeks ago
ummm pretty much all modern desktops have tpms
upvoted 1 times
...
...
8b48948
8 months, 3 weeks ago
If you issue certs from AD CS to Windows devices the private user key is not stored on the TPM of the laptop. This would have to be PKI IMO.
upvoted 2 times
...
GPrep
10 months, 3 weeks ago
Selected Answer: B
B - from CISSP Official Study Guide (Sybex) - Trusted Platform Module Modern computers often include a specialized cryptographic component known as a Trusted Platform Module (TPM). The TPM is a chip that resides on the motherboard of the device. The TPM serves a number of purposes, including the storage and management of keys used for full-disk encryption (FDE) solutions. The TPM provides the operating system with access to the keys only if the user successfully authenticates. This prevents someone from removing the drive from one device and inserting it into another device to access the drive's data. Chapple, Mike; Stewart, James Michael; Gibson, Darril. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (Sybex Study Guide) (p. 286). Wiley. Kindle Edition.
upvoted 1 times
...
abenall
1 year ago
The best answer is B. Trusted Platform Module (TPM) because TPMs provide hardware-based security that is more resilient to external software attacks than software-based encryption solutions. They are designed to protect and store cryptographic keys securely within the hardware, making it a suitable option for securing the private keys of a certification authority.
upvoted 1 times
...
Ukpes
1 year ago
Selected Answer: B
A Trusted Platform Module (TPM) is a cryptographic processor embedded into a computer. It provides authentication and full-disk encryption.
upvoted 1 times
...
dimosatteia
1 year, 2 months ago
Selected Answer: B
TPM is correct.
upvoted 1 times
...
Sledge_Hammer
1 year, 2 months ago
B is the correct answer! A Trusted Platform Module (TPM) is a specialized chip on a laptop or desktop computer that is designed to secure hardware with integrated cryptographic keys. A TPM helps prove a user's identity and authenticates their device. In this case, the employees each own a TPM compliant device.
upvoted 1 times
...
KelvinYau
1 year, 5 months ago
Selected Answer: B
I think should be A vs B. the question asking internal certification <- so i choose B
upvoted 1 times
...
A1nthem
1 year, 7 months ago
Selected Answer: B
designing and implementing an "internal" certification authority
upvoted 2 times
...
4study
1 year, 10 months ago
Selected Answer: B
I vote B as well
upvoted 1 times
jackdryan
1 year, 7 months ago
B is correct
upvoted 1 times
...
...
JohnyDal
1 year, 10 months ago
Selected Answer: B
TPM and HSM are the best options to store crypto keys
upvoted 3 times
...
Delab202
1 year, 10 months ago
Selected Answer: D
Public key infrastructure (PKI) The certificate is signed by a central and respected certificate authority (CA) to vouch for its authenticity. A large organization might manage a private CA for internal communications, while several third-party public CAs offer internet-based certificate services. If a certificate is compromised, the CA can revoke it and issue a new one. X.509 certificates use it by default. PKI itself encompasses multiple trust models.
upvoted 3 times
jens23
1 year, 5 months ago
No, the trust models are established between the certificates, not how the private keys are stored. PKI administrators are responsible to find a secure way how to store the private keys. It would be a no-brainer if HSM was one of the choices, but it isn't. The thing closest to HSM is actually TPM. TPMs are not primarily designed for storing a large number of private keys, but they offer hardware-based security features that make them well-suited for securely storing cryptographic keys, including private keys. TPMs provide a dedicated and tamper-resistant storage area within the hardware, protecting the keys from unauthorized access, tampering, or theft.
upvoted 3 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...