Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 384 discussion

Actual exam question from ISC's CISSP
Question #: 384
Topic #: 1
[All CISSP Questions]

An organization is implementing data encryption using symmetric ciphers and the Chief Information Officer (CIO) is concerned about the risk of using one key to protect all sensitive data. The security practitioner has been tasked with recommending a solution to address the CIO's concerns. Which of the following is the
BEST approach to achieving the objective by encrypting all sensitive data?

  • A. Use a Secure Hash Algorithm 256 (SHA-256).
  • B. Use Rivest-Shamir-Adleman (RSA) keys.
  • C. Use a hierarchy of encryption keys.
  • D. Use Hash Message Authentication Code (HMAC) keys.
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
YesPlease
11 months, 1 week ago
Selected Answer: C
Answer C) The CIO doesn't want to change the current symmetric key setup, he is only worried about how to protect the current setup. https://aws.amazon.com/blogs/security/benefits-of-a-key-hierarchy-with-a-master-key-part-two-of-the-aws-cloudhsm-series/
upvoted 2 times
...
Soleandheel
11 months, 2 weeks ago
C. Use a hierarchy of encryption keys. Using a hierarchy of encryption keys is a common practice in encryption to enhance security. In this approach, a single master key is used to encrypt and protect other keys, which are used to encrypt the actual data. This provides an additional layer of security and control, as compromising the master key alone doesn't compromise the security of all sensitive data. It allows for better management and rotation of keys as needed.
upvoted 2 times
...
Rollingalx
1 year, 9 months ago
I go with C. RSA is an asymmetric encryption algorithm that is typically used for key exchange and digital signatures, but it is not ideal for encrypting large amounts of data.
upvoted 1 times
jackdryan
1 year, 6 months ago
C is correct
upvoted 1 times
...
...
Berto
1 year, 9 months ago
Moderators, RSA is obviously Asymmetric, why is this the answer?
upvoted 2 times
Berto
1 year, 9 months ago
One SME told me this: "the CIO is concerned about having one key" Asymmetric means there are 2 keys ultimately mitigating the concern. Taking the test in 4 days, will let everyone know if I see this and pass.
upvoted 4 times
crishnamohan
1 year, 9 months ago
Please check how many you got from this list of questions and post it as well.
upvoted 4 times
...
...
...
JohnyDal
1 year, 10 months ago
Selected Answer: C
Key hierarchy solves the issue. Its like leveraging hybrid cryptography
upvoted 3 times
...
DJOEK
1 year, 10 months ago
Selected Answer: C
C. Use a hierarchy of encryption keys, also known as a key hierarchy, is the BEST approach to achieving the objective by encrypting all sensitive data. This approach involves using different keys for different levels of data, such as using a different key for each individual user or a different key for each specific data set. This allows for more granular control and management of the encryption keys, and reduces the risk of a single key being compromised and all sensitive data being exposed.
upvoted 4 times
...
wedso
1 year, 10 months ago
Selected Answer: C
One good way is by using a key hierarchy. This is simply a way to organize encryption keys so that a root (or master) key is used to encrypt other keys that are in turn used to encrypt the actual data you want to protect. A key hierarchy provides a powerful pattern for storing an application’s cryptographic keys. It also allows you to use different keys for different data while allowing you to focus your protection efforts on the master key. Ref: https://aws.amazon.com/blogs/security/benefits-of-a-key-hierarchy-with-a-master-key-part-two-of-the-aws-cloudhsm-series/#:~:text=One%20good%20way%20is%20by,storing%20an%20application's%20cryptographic%20keys.
upvoted 2 times
...
ikidreamz
1 year, 11 months ago
RSA is correct. Rest all are Hash algorithms
upvoted 1 times
...
rdy4u
2 years ago
Selected Answer: B
File/message will generally be encrypted with a symmetric-key algorithm, and then the symmetric key will be encrypted with RSA encryption. Under this process, only an entity that has access to the RSA private key will be able to decrypt the symmetric key. https://www.comparitech.com/blog/information-security/rsa-encryption/
upvoted 4 times
Jamati
2 years ago
The organization is using symmetric ciphers. RSA is Asymmetric.
upvoted 1 times
bynd
2 years ago
The security practitioner recommends Asymmetric cryptography; RSA is the correct answer.
upvoted 1 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...