CCSP Exam QuestionsBrowse all questions from this exam

CCSP Exam - Question 71


If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

Show Answer
Correct Answer: D

iSCSI does not natively support encryption, meaning that encryption must come from an external protocol or application such as IPsec to secure the communications between iSCSI endpoints.

Discussion

3 comments
Sign in to comment
akg001Option: D
May 18, 2022

D. Encryption

ST42Option: D
Mar 4, 2024

Data Encryption: the data exchanged between the iSCSI initiator and iSCSI target is not encrypted, which is why an attacker who is able to sniff the data of the wire will also be able to reconstruct the data, or more precisely, the files and directories transferred between the two parties. Additionally, an attacker might also be able to inject his own data into the traffic, thus creating/modifying/deleting arbitrary files on the iSCSI target. To mitigate the risk, the IPsec ought to be used to properly encrypt the communication between the iSCSI endpoints. https://resources.infosecinstitute.com/topics/cloud/iscsi-security-considerations-cloud/

globy118Option: B
Jun 10, 2024

B. Use CHAP (Challenge Handshake Authentication Protocol) to ensure each host has its own password.