Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 201

A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt that data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?

    Correct Answer: A

    Key rotation involves periodically replacing cryptographic keys with new ones to enhance security. When an existing key is discovered and made public, rotating the key means the compromised key will be revoked and replaced with a new key, rendering the old one useless. This ensures that the data is protected from unauthorized access using the compromised key. Key escrow is not applicable in this scenario as it is intended for storing keys in a secure manner, not for replacing compromised keys.

Discussion
eomsg001

This is a repeat question to #178

Mundo

This one leaves out the answer choice of Key revocation which was the correct to #178

isaphiltrick

Doesn't that tell you that "key revocation" may not have been the correct answer for #178?

FOURDUEOption: A

KEY ROTATION - Purposely changing keys on a periodic basis to mitigate issues associated with brute force attacks or unidentified key breach incidents. Previous key must be revoked as part of the rotation process.

OneSaintOption: A

I'll go with A, Key Rotation is most effective in protecting data. Key Escrow in simple terms is if you loose an encryption key, the CA will give you a key to decrypt stuff.

imatherOption: A

Key rotation. The question is how to protect the data that has an exposed key. Obviously, zeriozation is non-applicable. Cryptographic obfuscation is also not applicable. The data is already encrypted i.e. cryptographically obfuscated. A key rotation would re-encrypt the data on the website with new keys, protecting it and preventing the use of the old keys. Repeat of 178 https://cpl.thalesgroup.com/blog/data-protection/encryption-key-rotation-data-security

splinkOption: A

I feel the answer is A here. Key Rotation allows you to actually revoke a key and use a new one. Key escrow simply holds the key/keys for you. This really doesn't help you with revoking a key, which needs to be done since your encryption is compromised, as the question illustrates.

Delab202Option: A

Key rotation is a security practice that involves periodically replacing cryptographic keys with new ones to enhance the security of a system. This process is crucial for managing cryptographic materials used for encryption, decryption, digital signatures, and other security-related operations. Key rotation helps mitigate the risk associated with long-term exposure of cryptographic keys and limits the potential impact of a compromised key.