Exam CCSP All QuestionsBrowse all questions from this exam
Question 71

If you're using iSCSI in a cloud environment, what must come from an external protocol or application?

    Correct Answer: D

    iSCSI does not natively support encryption, meaning that encryption must come from an external protocol or application such as IPsec to secure the communications between iSCSI endpoints.

Discussion
akg001Option: D

D. Encryption

globy118Option: B

B. Use CHAP (Challenge Handshake Authentication Protocol) to ensure each host has its own password.

ST42Option: D

Data Encryption: the data exchanged between the iSCSI initiator and iSCSI target is not encrypted, which is why an attacker who is able to sniff the data of the wire will also be able to reconstruct the data, or more precisely, the files and directories transferred between the two parties. Additionally, an attacker might also be able to inject his own data into the traffic, thus creating/modifying/deleting arbitrary files on the iSCSI target. To mitigate the risk, the IPsec ought to be used to properly encrypt the communication between the iSCSI endpoints. https://resources.infosecinstitute.com/topics/cloud/iscsi-security-considerations-cloud/