exam questions

Exam CAS-004 All Questions

View all questions & answers for the CAS-004 exam

Exam CAS-004 topic 1 question 344 discussion

Actual exam question from CompTIA's CAS-004
Question #: 344
Topic #: 1
[All CAS-004 Questions]

A security architect recommends replacing the company's monolithic software application with a containerized solution. Historically, secrets have been stored in the application's configuration files. Which of the following changes should the security architect make in the new system?

  • A. Use a secrets management tool.
  • B. Save secrets in key escrow.
  • C. Store the secrets inside the Dockerfiles.
  • D. Run all Dockerfiles in a randomized namespace.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
weaponxcel
8 months, 1 week ago
Selected Answer: A
A. Use a secrets management tool. Secrets management tools provide a secure way to store and manage secrets, such as passwords, API keys, and encryption keys. They can be used to encrypt secrets at rest and in transit, and to rotate secrets on a regular basis. The other options are not as secure: B. Save secrets in key escrow: Key escrow is a process where the secrets are stored with a third party. This can be a security risk, as the third party could potentially access the secrets. C. Store the secrets inside the Dockerfiles: Storing secrets in the Dockerfiles is not secure, as the Dockerfiles are typically stored in a public repository. This means that anyone with access to the Dockerfiles could also access the secrets. D. Run all Dockerfiles in a randomized namespace: Running all Dockerfiles in a randomized namespace does not provide a way to store and manage secrets securely.
upvoted 2 times
...
32d799a
8 months, 2 weeks ago
Selected Answer: A
A. Use a secrets management tool. Secrets management tools, like HashiCorp Vault, AWS Secrets Manager, or Azure Key Vault, are designed to manage sensitive data like API keys, passwords, and certificates. Using such tools allows for centralized management, fine-grained access control, and audit logging.
upvoted 1 times
...
CXSSP
9 months, 2 weeks ago
Selected Answer: A
A. Use a secrets management tool. In a containerized environment, it's best practice to use a secrets management tool to securely manage sensitive information like passwords, API keys, and other credentials. This allows for better security, easier rotation of credentials, and reduces the risk of exposing secrets in configuration files. Storing secrets in a dedicated tool designed for secure management helps protect against unauthorized access and ensures better overall security in the new system.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...