exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 98 discussion

Actual exam question from ISC's CISSP
Question #: 98
Topic #: 1
[All CISSP Questions]

A security professional needs to find a secure and efficient method of encrypting data on an endpoint. Which solution includes a root key?

  • A. Bitlocker
  • B. Trusted Platform Module (TPM)
  • C. Virtual storage array network (VSAN)
  • D. Hardware security module (HSM)
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Arunlab
Highly Voted 2 years, 4 months ago
Solution is Bitlocker and storing location is TPM.. Ans: A
upvoted 12 times
cmakiva
1 year, 5 months ago
Bitlocker is the only encryption method on the list
upvoted 3 times
...
...
stickerbush1970
Highly Voted 2 years, 6 months ago
Selected Answer: B
A TPM is a specific device to keep it's own keys secure (source of identity) While an HSM is a general device to secure foreign keys (verify identity)
upvoted 6 times
dev46
2 years, 6 months ago
Yes - B TPM is in-built chip on motherboard such as iPhone calls it T2 while HSM is external hardware device that can be removed. HSM usage is usually for datacentres while TPM focus on endpoint/ device/ machine.
upvoted 4 times
...
jackdryan
1 year, 10 months ago
B is correct
upvoted 1 times
...
...
amitsir
Most Recent 5 days, 19 hours ago
Selected Answer: A
changing to A, just realised that the keyword is encryption. and bitlocker only provide encryption when TPM is used along with bitlocker it uses root key. but TPM itself is not a encryption method.
upvoted 1 times
...
amitsir
5 days, 19 hours ago
Selected Answer: B
TPM is right. bitlocker can work without TPM as well. however bitlocker + TPM improves security.
upvoted 1 times
...
Imranbhatti
2 weeks, 3 days ago
Selected Answer: B
The solution that includes a root key is: B. Trusted Platform Module (TPM). A Trusted Platform Module (TPM) is a hardware-based security device that provides secure generation and storage of cryptographic keys, including root keys. It is designed to ensure the integrity of the platform and can be used to securely encrypt data on an endpoint. While BitLocker is a robust encryption solution, it does not inherently include a root key. BitLocker works in conjunction with a Trusted Platform Module (TPM) to provide enhanced security, but the TPM is the component that generates and stores the root key. BitLocker itself is a software feature that encrypts entire volumes and relies on the TPM for secure key management. In contrast, the TPM is specifically designed to generate, store, and manage cryptographic keys, including root keys, making it the correct answer for a solution that includes a root key.
upvoted 2 times
...
Edsaasa
3 weeks ago
Selected Answer: A
The solution (Bitlocker) includes the use of a root key, which is stored in the TPM
upvoted 1 times
...
Rider2053
1 month, 1 week ago
Selected Answer: B
A Trusted Platform Module (TPM) is a hardware-based security feature that includes a root key stored in a secure cryptographic processor. TPM is used for encryption, secure boot, and system integrity verification. It helps in securely encrypting data on endpoints by managing encryption keys, such as those used by BitLocker in Windows.
upvoted 1 times
...
Bau24
1 month, 2 weeks ago
Selected Answer: A
The Bitlocker use Root Key for the encryption and stores Root key in TPM
upvoted 1 times
...
zehn
2 months, 3 weeks ago
Selected Answer: B
While BitLocker can leverage TPM for secure key storage and encryption, it does not include a root key itself. The root key comes from the TPM, not BitLocker.
upvoted 1 times
...
Socca
2 months, 3 weeks ago
Selected Answer: A
BitLocker is a full disk encryption feature built into Windows that uses a root key to encrypt the data on an endpoint. The root key is typically protected using a Trusted Platform Module (TPM) chip, which provides hardware-based security for the encryption keys, ensuring that they are not easily accessible or tampered with.
upvoted 1 times
...
RFULL
4 months, 3 weeks ago
Selected Answer: A
Bitlocker is the only encryption solution listed, and it does include a root key. TPM and HSM can store these keys.
upvoted 3 times
...
deeden
7 months, 3 weeks ago
Selected Answer: B
Comparison: TPM: Integrated into endpoint devices. Secure storage of root keys. Used for disk encryption (e.g., BitLocker). Cost-effective for individual devices. HSM: External hardware used in server environments. Provides high-security key management for enterprise applications. More expensive and complex to implement on individual endpoints.
upvoted 1 times
...
8b48948
11 months, 2 weeks ago
HSMs are nothing to do with endpoints.
upvoted 3 times
...
Vasyamba1
1 year ago
Selected Answer: D
OSG - A TPM is an example of a hardware security module (HSM). So, D includes B.
upvoted 2 times
...
homeysl
1 year ago
Selected Answer: B
TPM = endpoint device
upvoted 1 times
...
hoho2000
1 year ago
Selected Answer: A
Ans is A. Its asking which one can do encrtpytion and has use key crypto. TPM and HSM only store crypto keys, it is not any encryption device. https://support.microsoft.com/en-us/topic/what-is-tpm-705f241d-025d-4470-80c5-4feeb24fa1ee
upvoted 2 times
...
gjimenezf
1 year, 2 months ago
Selected Answer: D
Only HSM includes a root key
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago