New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CompTIA CAS-005 Exam - Topic 2 Question 10 Discussion

Actual exam question for CompTIA's CAS-005 exam
Question #: 10
Topic #: 2
[All CAS-005 Questions]

Which of the following key management practices ensures that an encryption key is maintained within the organization?

Show Suggested Answer Hide Answer
Suggested Answer: A

Comprehensive and Detailed Step by Step

Understanding the Scenario: The question is about ensuring that an organization retains control over its encryption keys. It focuses on different key storage and management methods.

Analyzing the Answer Choices:

A . Encrypting using a key stored in an on-premises hardware security module (HSM): This is the best option for maintaining complete control over encryption keys. An HSM is a dedicated, tamper-resistant hardware device specifically designed for secure key storage and cryptographic operations. Storing keys on-premises within an HSM ensures the organization has exclusive access.


B . Encrypting using server-side encryption capabilities provided by the cloud provider: With server-side encryption, the cloud provider typically manages the encryption keys. This means the organization is relinquishing some control over the keys.

C . Encrypting using encryption and key storage systems provided by the cloud provider: Similar to option B, using cloud-provider-managed key storage systems means the organization doesn't have full, exclusive control over the keys.

D . Encrypting using a key escrow process for storage of the encryption key: Key escrow involves entrusting a third party with a copy of the encryption key. This introduces a potential security risk, as the organization no longer has sole control over the key. Also, the key is not maintained within the organization.

Why A is the Correct Answer:

Control: On-premises HSMs provide the highest level of control over encryption keys. The organization has physical and logical control over the HSM and the keys stored within it.

Security: HSMs are designed to be tamper-resistant and protect keys from unauthorized access, even if the surrounding systems are compromised.

Compliance: In some industries, regulatory requirements may mandate that organizations maintain direct control over their encryption keys. On-premises HSMs can help meet these requirements.

CASP+ Relevance: HSMs, key management, and data encryption are fundamental topics in CASP+. The exam emphasizes understanding the security implications of different key management approaches.

Elaboration on Key Management Principles:

Key Lifecycle Management: Proper key management involves managing the entire lifecycle of a key, from generation and storage to rotation and destruction.

Separation of Duties: It's generally a good practice to separate the roles of key management and data encryption to enhance security.

Access Control: Strict access controls should be in place to limit who can access and use encryption keys.

In conclusion, using an on-premises HSM for key storage is the best way to ensure that an organization maintains control over its encryption keys. It provides the highest level of security and control, aligning with best practices in cryptography and key management as emphasized in the CASP+ exam objectives.

Contribute your Thoughts:

0/2000 characters
Blair
3 months ago
D is risky; key escrow can lead to vulnerabilities.
upvoted 0 times
...
Beatriz
3 months ago
Surprised that people still trust cloud key storage!
upvoted 0 times
...
Ahmed
3 months ago
C just hands over control to the cloud provider.
upvoted 0 times
...
Muriel
4 months ago
I disagree, B can be secure too if done right.
upvoted 0 times
...
Christiane
4 months ago
A is definitely the best option for keeping keys in-house.
upvoted 0 times
...
Yoko
4 months ago
I’m confused about option C; it sounds like it could be secure, but I don’t think it keeps the key within our control.
upvoted 0 times
...
Son
4 months ago
I practiced a similar question, and I feel like using server-side encryption from the cloud provider might not keep the key in-house, so I would lean towards A as well.
upvoted 0 times
...
Rolande
4 months ago
I'm not entirely sure, but I remember something about key escrow being a way to manage keys. Could it be option D?
upvoted 0 times
...
Marilynn
5 months ago
I think option A is the right choice since it mentions an on-premises hardware security module, which keeps the key within the organization.
upvoted 0 times
...
Carlota
5 months ago
I'm a little confused by the wording of this question. Are the cloud provider options really not viable for maintaining the encryption key within the organization? I'll have to review my notes on key management best practices to make sure I'm choosing the right answer.
upvoted 0 times
...
Jesus
5 months ago
Okay, I've got this. The question is asking about key management practices, so anything involving the cloud provider is not going to be the right answer. I'm going with option A - the on-premises hardware security module.
upvoted 0 times
...
Solange
5 months ago
Hmm, I'm a bit unsure about this one. The cloud provider options seem tempting, but I know we need to keep the key management in-house. I'll have to think this through carefully.
upvoted 0 times
...
Mozelle
5 months ago
This question seems pretty straightforward. I think the key is maintaining control over the encryption key within the organization, so option A about using an on-premises hardware security module is the way to go.
upvoted 0 times
...
Madelyn
12 months ago
Option C? More like 'Encrypt and Pray the Cloud Provider Doesn't Lose It'!
upvoted 0 times
...
Carman
12 months ago
Option B is a no-go for me. Trusting the cloud provider with the encryption key? No thanks, I'd rather keep it under my own roof!
upvoted 0 times
Tran
11 months ago
D) Encrypting using a key escrow process for storage of the encryption key
upvoted 0 times
...
Cortney
11 months ago
A) Encrypting using a key stored in an on-premises hardware security module
upvoted 0 times
...
...
Francoise
1 year ago
Hmm, I'm torn between A and D. Both seem to keep the key in-house, but D's 'key escrow' process sounds intriguing. I'll have to research that more.
upvoted 0 times
Alise
12 months ago
That's true, D does offer a unique way to store the encryption key. It's worth looking into further.
upvoted 0 times
...
Benedict
12 months ago
I'm leaning towards D. The key escrow process sounds like it could provide an extra layer of security.
upvoted 0 times
...
Mica
12 months ago
I agree, A seems like a secure way to maintain control over the encryption key.
upvoted 0 times
...
Vanda
12 months ago
I think A is the best option. Storing the key in an on-premises hardware security module is a good practice.
upvoted 0 times
...
...
Skye
1 year ago
But wouldn't it be safer to keep the encryption key within the organization's control, like option A suggests?
upvoted 0 times
...
Johana
1 year ago
I agree with Belen. Option A ensures that the encryption key is not at the mercy of a third-party cloud provider.
upvoted 0 times
Hyman
11 months ago
I think option D could also be a good choice for key management.
upvoted 0 times
...
Karl
11 months ago
I agree with you, option A is more secure.
upvoted 0 times
...
Janna
11 months ago
I prefer option C, using encryption and key storage systems provided by the cloud provider.
upvoted 0 times
...
Larue
12 months ago
I think option A is the best choice.
upvoted 0 times
...
...
Lashawn
1 year ago
I disagree, I believe the correct answer is C) Encrypting using encryption and key storage systems provided by the cloud provider.
upvoted 0 times
...
Skye
1 year ago
I think the answer is A) Encrypting using a key stored in an on-premises hardware security module.
upvoted 0 times
...
Belen
1 year ago
Option A is the way to go. Keeping the key within the organization's control is crucial for maintaining security.
upvoted 0 times
Lyla
1 year ago
C
upvoted 0 times
...
Ashton
1 year ago
A
upvoted 0 times
...
...

Save Cancel