exam questions

Exam SK0-005 All Questions

View all questions & answers for the SK0-005 exam

Exam SK0-005 topic 1 question 29 discussion

Actual exam question from CompTIA's SK0-005
Question #: 29
Topic #: 1
[All SK0-005 Questions]

Which of the following must a server administrator do to ensure data on the SAN is not compromised if it is leaked?

  • A. Encrypt the data that is leaving the SAN
  • B. Encrypt the data at rest
  • C. Encrypt the host servers
  • D. Encrypt all the network traffic
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
fluke92
7 months, 1 week ago
Selected Answer: B
Encrypting data at rest ensures that the data stored on the SAN is protected from unauthorized access, even if the storage medium is compromised or stolen. This is a critical step to secure sensitive information and mitigate the risk of data breaches.
upvoted 2 times
...
a792193
1 year, 6 months ago
Selected Answer: B
B. Encrypting Data at rest would ensure the data is unreadable if it is leaked.
upvoted 1 times
...
Kraken84
1 year, 8 months ago
To ensure data on the SAN (Storage Area Network) is not compromised if it is leaked, the server administrator should: B. Encrypt the data at rest Encrypting the data at rest ensures that even if the data is accessed or leaked, it remains unreadable without the appropriate decryption key. This provides a layer of security against unauthorized access to the data stored on the SAN. ~ChatGpT4
upvoted 1 times
...
Amorprecious
2 years, 3 months ago
B. To ensure data on the SAN is not compromised if it is leaked, a server administrator should encrypt the data at rest. This means that the data is encrypted while it is stored on the SAN. This way, even if the data is accessed or copied without authorization, it will be unreadable without the encryption key. Encrypting the data that is leaving the SAN or encrypting all network traffic can help protect data while it is in transit, but it does not necessarily protect the data if it is leaked from the SAN. Encrypting the host servers may also be a good security practice, but it does not directly address the issue of data leakage from the SAN.
upvoted 1 times
...
Laudy
2 years, 3 months ago
Selected Answer: B
It's referring to data ON the SAN. Data at rest.
upvoted 2 times
...
Obi_Wan_Jacoby
2 years, 5 months ago
Selected Answer: B
I concur with answer B. I see answer D achieving the need for SAN traffic being encrypted. Why have A and D as D would take care of said traffic? The encryption of data at rest is what we are looking for.
upvoted 1 times
Obi_Wan_Jacoby
2 years, 5 months ago
Coming back to this a little later.. Now I am thinking answer A is in-fact correct.
upvoted 1 times
...
...
nixonbii
2 years, 8 months ago
I can accept B but I wish they had not included D as an option. Basic cyber-security principle: protection of data in motion, at rest, in process.
upvoted 2 times
...
paperburn
2 years, 8 months ago
Encrypt Data at Rest on the Storage Array of drives.
upvoted 2 times
...
dcdc1000
2 years, 9 months ago
Answer is B. Because the question states "data on the SAN" so if you encrypt data at rest, this will prevent data compromised.
upvoted 2 times
...
TheITStudent
2 years, 10 months ago
Selected Answer: A
Best Guess is A, Encrypt all data leaving the SAN. Data can leave through local transfer (USB drive) a network vulnerability from outsider/insider, . So data needs to be encrypted at rest, but also possibly in transit. But if you can encrypt "all data that leaves SAN" then that would cover everything... all these questions seem very ambiguous......
upvoted 2 times
i_bird
2 years, 10 months ago
SAN is a network, the whole idea of this approach is for multiple devices to be able to access a shared filesystem, not DAS,, which is the Storage device attached to a server that SAN can use to share a filesystem across multiple devices on the network Data Loss(breach) Prevention Method: 1; Encrypt all "SAN" network traffic.. 2; Another approach is to Encrypt Data at Rest on the Storage Array of drives. They both go together like peanut butter and jelly for a perfect sandwich (Data Breach Protection on SAN).
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...