Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 191 discussion

Actual exam question from ISC's CISSP
Question #: 191
Topic #: 1
[All CISSP Questions]

Which of the following is an example of a vulnerability of full-disk encryption (FDE)?

  • A. Data on the device cannot be restored from backup.
  • B. Data on the device cannot be backed up.
  • C. Data in transit has been compromised when the user has authenticated to the device.
  • D. Data at rest has been compromised when the user has authenticated to the device.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
629f731
10 months, 3 weeks ago
Selected Answer: D
This scenario can occur if an attacker gains unauthorized access to the device while it's in use (authenticated state) and the FDE gets temporarily deactivated. If the attacker can exploit this situation, they might access or tamper with data that is supposed to be protected by FDE.
upvoted 3 times
...
Soleandheel
11 months, 2 weeks ago
D. Data at rest has been compromised when the user has authenticated to the device. Full-disk encryption typically protects data when the device is powered off or at rest. However, if an attacker gains access to the device while it's running and the user has authenticated to the device (e.g., logged in), the data may be vulnerable. This is because FDE generally decrypts the data when the user is authenticated and using the device, making it susceptible to compromise if the device is compromised while in use.
upvoted 3 times
...
RVoigt
1 year, 9 months ago
Selected Answer: D
CISSP OSG pgs 410-411 talk about FDE. One section includes "If most or all of the storage media of a device can be encrypted, this is usually a worthwhile feature to enable. However, encryption isn't a guarantee of protection for data, especially if the device is stolen while unlocked or if the system itself has a known backdoor attack vulnerability."
upvoted 2 times
jackdryan
1 year, 6 months ago
D is correct
upvoted 1 times
georgegeorge125487
1 year, 3 months ago
D is correct
upvoted 1 times
...
...
...
init2winit
1 year, 10 months ago
Selected Answer: D
FDE is Data at Rest, Weakness is if the user has the credentials to authenticate to the Device
upvoted 4 times
...
DJOEK
1 year, 10 months ago
Selected Answer: D
Option C, "Data in transit has been compromised when the user has authenticated to the device," is not a vulnerability of FDE. FDE is designed to protect data at rest and has no impact on data in transit. Data in transit is typically protected using other security measures such as encryption or secure communication protocols. Option D, "Data at rest has been compromised when the user has authenticated to the device," is a potential vulnerability of FDE. If a user has authenticated to a device with FDE enabled, it is possible that an attacker could gain access to the data if the user's authentication credentials are compromised or if there is a weakness in the FDE implementation. It is important to ensure that FDE is properly configured and implemented to minimize this risk.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
Selected Answer: D
Given answer seems correct. Because the FDE is not responsible to protect data in transit anyway. But it is responsible to protect data at rest. Now, once a user login the machine (decrypt the disk), all data will be accessible, and if a hacker compromised the machine remotely, he can read the data clearly.
upvoted 1 times
...
oudmaster
1 year, 11 months ago
with FDE, any data in transit is compromised whether the user is authenticated or not. So, I believe option C is irrelevant answer.
upvoted 1 times
...
Jamati
2 years ago
Selected Answer: C
Answer is C. One of the vulnerabilities of FDE is that it does not protect data in transit. The 5 limitations of FDE are as follows: 1. FDE Doesn’t Protect Data in Transit 2. FDE Can Slow Down Processes 3. FDE Is Only as Strong as Its Password 4. FDE Doesn’t Apply When Files Are in Use as they have to be decrypted 1st before being handed over to the processor. 5. FDE Is Only Effective If Applied Consistently https://www.cigent.com/resources/5-limitations-of-full-disk-encryption-1464
upvoted 4 times
...
rdy4u
2 years, 1 month ago
Selected Answer: D
‍Just as full disk encryption doesn't encrypt data in transit, it doesn't protect files currently in use, either. When an authorized user opens an FDE-encrypted file, they decrypt it, and it encrypts again once they log out. That means this data could be vulnerable while users are working with it. https://www.cigent.com/resources/5-limitations-of-full-disk-encryption-1464
upvoted 1 times
Jamati
2 years ago
D applies to data at rest, which is well secured by FDE. Only data in-transit and data in-process are at risk.
upvoted 1 times
...
...
Cww1
2 years, 2 months ago
correct
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...