exam questions

Exam CS0-002 All Questions

View all questions & answers for the CS0-002 exam

Exam CS0-002 topic 1 question 120 discussion

Actual exam question from CompTIA's CS0-002
Question #: 120
Topic #: 1
[All CS0-002 Questions]

While implementing a PKI for a company, a security analyst plans to utilize a dedicated server as the certificate authority that is only used to sign intermediate certificates. Which of the following are the MOST secure states for the certificate authority server when it is not in use? (Choose two.)

  • A. On a private VLAN
  • B. Full disk encrypted
  • C. Powered off
  • D. Backed up hourly
  • E. VPN accessible only
  • F. Air gapped
Show Suggested Answer Hide Answer
Suggested Answer: CF 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
robullo
Highly Voted 2 years, 9 months ago
Selected Answer: BF
Without encryption, an insider threat can steal the server's HD.
upvoted 6 times
RoVasq3
2 years, 9 months ago
I concur with B and F
upvoted 2 times
TeyMe
2 years, 8 months ago
Air gapped is tightly security control for both technical and physical. Check that out.. CYSA study guide
upvoted 1 times
...
...
roman1000
2 years, 7 months ago
Air gapped is already secured. Refer to wikipedia, Should root CA be offline? A common method to ensure the security and integrity of a root CA is to keep it in an offline state. It is only brought online when needed for specific, infrequent tasks, typically limited to the issuance or re-issuance of certificates authorizing intermediate CAs.
upvoted 2 times
...
...
amateurguy
Highly Voted 2 years, 10 months ago
Selected Answer: CF
I would first say Air Gapped and backed up hourly because in the workplace, it is very common to take backups at minimum on a daily basis (hourly is even better) but i dont think backed up hourly falls under the definition of "secure state" so i have to go with air gapped and powered off. So i have to go with C and F.
upvoted 5 times
...
zecomeia_007
Most Recent 11 months, 3 weeks ago
Selected Answer: BF
Full disk encrypted: This ensures that even if the physical server is compromised, the data on the disk remains protected. Air gapped: This isolates the CA server from any network connection, preventing unauthorized access and potential malware infections.
upvoted 1 times
...
Big_Dre
1 year, 11 months ago
Selected Answer: CF
rule number 1. a powered down system is a secured system because it cant be compromise 2, an air gap is a pretty secure security measure. if they asked for 3 then we can talk encryption now.
upvoted 3 times
...
heinzelrumpel
1 year, 11 months ago
Selected Answer: BF
Airgapped, because Root CA never goes online Encrypted in case the HDD or server will be stolen
upvoted 1 times
...
heinzelrumpel
1 year, 11 months ago
Our tutor was telling us about a certificate signing ceremony https://www.keyfactor.com/blog/top-5-root-ca-key-signing-ceremony-mistakes/ Please read Mistake #1 - Never bring a root CA online
upvoted 1 times
heinzelrumpel
1 year, 11 months ago
A root CA is only signing Certificates for intermediate CAs. This can be done offline. The CSR will be presented to the Root Ca eg. via USB Stick and given back the same way.
upvoted 1 times
...
...
Justian
2 years ago
Selected Answer: CF
Because I'm confident with this answer
upvoted 2 times
...
kiduuu
2 years, 3 months ago
Selected Answer: AF
By placing the certificate authority server on a private VLAN, it is isolated from other networks and can only be accessed by authorized users. This helps to reduce the risk of unauthorized access and potential attacks. Options A and F are the most secure states for the certificate authority server when it is not in use. Full disk encryption, backing up hourly, and VPN accessibility can provide additional security measures but do not guarantee the server's complete isolation and protection from unauthorized access or attacks. Powering off the server is also a secure state, but it would not allow the server to be used when it is needed.
upvoted 1 times
...
HereToStudy
2 years, 3 months ago
Selected Answer: BC
Encryption will help with physical attacks. And powered off will prevent remote attacks
upvoted 1 times
...
[Removed]
2 years, 3 months ago
Selected Answer: CF
CF Powered Off is the Most secure state. Don't think of it too hard. I work in a field that yells this all the time.
upvoted 3 times
HereToStudy
2 years, 3 months ago
the certificate authority server needs to be accessible to issue certificates. So power off would not be the answer
upvoted 1 times
HereToStudy
2 years, 3 months ago
My bad it is when it is not in use. In which case I agree with you
upvoted 1 times
HereToStudy
2 years, 3 months ago
I’m curious what good airgapping is once it’s powered off? Maybe powered off and encrypted incase anyone gets physical access
upvoted 1 times
...
...
...
...
101martin101
2 years, 3 months ago
The most secure states for the certificate authority server when it is not in use are: B. Full disk encrypted: This would prevent unauthorized access to the server's data in case the server is stolen or misplaced. This is especially important for a server that holds sensitive data like a certificate authority. F. Air gapped: An air-gapped system is physically isolated from other networks, which can prevent it from being accessed or compromised remotely. This can be an effective way to protect the certificate authority server from attacks, particularly those that may be launched over a network. While the other options, such as on a private VLAN, powered off, backed up hourly, or VPN accessible only, may provide some degree of security, they may not be sufficient to protect the certificate authority server from advanced attacks that may target the server's data and resources.
upvoted 1 times
...
aleXplicitly
2 years, 4 months ago
Selected Answer: CF
root certificate authority is a certificate authority which has been isolated from network access, and is often kept in a powered-down state.
upvoted 3 times
2Fish
2 years, 4 months ago
Agree, "when not in use" is key. That means you can shut it down. All Root CA's should be shutdown when not in use. Of course we can call agree on Air Gap.
upvoted 2 times
...
...
db97
2 years, 4 months ago
Selected Answer: CF
CA should be off and completely isolated based on the good practices. Going for C&F here.
upvoted 2 times
...
AaronS1990
2 years, 5 months ago
Selected Answer: BF
I think we all agree F for the purposes of physical security, but what about a technical control. I see the argument for powered off, however those choosing powered off seem to be concerning data at rest only and that's because the question says when the server is not in use. I'll still go with encryption being better than simply turning it off.
upvoted 2 times
Lukers
2 years, 3 months ago
Full disk encryption is not a state, but rather a security measure. The question is specifically asking about MOST secure states for the certificate authority server. Considering this I'm going with C and F.
upvoted 1 times
...
...
Cock
2 years, 5 months ago
The two most secure states for the certificate authority server when it is not in use would likely be "Powered off" and "Air gapped". Powered off: This minimizes the attack surface of the server and reduces the risk of unauthorized access or manipulation. Air gapped: By physically separating the server from other networks, it makes it significantly more difficult for attackers to penetrate the network and access sensitive data. Additionally, air gapping ensures that malware cannot spread from one network to another.
upvoted 1 times
...
j0n45
2 years, 6 months ago
Selected Answer: CF
Your root CA should be standalone, and offline. That is to say, it should not be connected to a forest, and in fact, it should not ever be connected to any network. A Root CA’s only purpose is to sign and revoke subordinate CAs certificate requests, and create a periodic Certificate Revocation List file. That’s it. Other than that, there is no reason for this CA to even be powered on. Your root CA should be immune from online threats, as it’s not online, and should be physically and logically protected. Your root CA should never be put online for any reason ever. The moment you put this server online, your claim of “offline root” is no longer completely legitimate. https://social.technet.microsoft.com/Forums/en-US/342b2de5-0496-4b0c-aeb7-83069a545712/root-ca-offline?forum=winserversecurity
upvoted 1 times
...
bdub16
2 years, 6 months ago
Selected Answer: BF
Specifically for FDE. “When not in use” makes me think of data at rest.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...