Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 5V0-21.19 topic 1 question 36 discussion

Actual exam question from VMware's 5V0-21.19
Question #: 36
Topic #: 1
[All 5V0-21.19 Questions]

When using vSAN Encryption, where does the Key Encryption Key persistently reside?

  • A. in /etc/vmware/ssl on each vSAN host
  • B. in the KMS server
  • C. in a VM configuration file on vSAN
  • D. in the vCenter Server cache
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️
Reference:
https://blogs.vmware.com/virtualblocks/2018/07/13/understanding-ve-booting-w-vc-unavailable/

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Darius_Th3D0G
Highly Voted 4 years ago
I think B is the correct anaswer: https://blogs.vmware.com/virtualblocks/2018/07/13/understanding-ve-booting-w-vc-unavailable/
upvoted 7 times
...
LCOJ
Highly Voted 3 years, 10 months ago
I agree with B as per state below vCenter Server requests an AES-256 Key Encryption Key (KEK) from the KMS. vCenter Server stores only the ID of the KEK, but not the key itself. Each ESXi host uses the KEK to encrypt its DEKs, and stores the encrypted DEKs on disk. The host does not store the KEK on disk. If a host reboots, it requests the KEK with the corresponding ID from the KMS. The host can then decrypt its DEKs as needed.
upvoted 7 times
...
RRK06
Most Recent 2 years ago
Selected Answer: B
Key is always with Key server, it will be retrieved during need by ESXi host and vcenter
upvoted 1 times
...
Lundu1995
2 years, 3 months ago
B is correct!
upvoted 1 times
...
Lazylinux
2 years, 4 months ago
B for sure
upvoted 1 times
...
diegof1
3 years, 3 months ago
B is the correct answer. When encryption is enabled on a vSAN cluster: 1. vCenter Server requests an AES-256 KEK from the KMS. vCenter Server stores only the ID of the KEK. 2. vCenter Server sends the KEK ID to all hosts. 3. Hosts use the KEK ID to request the KEK from the KMS. 4. Hosts create a unique DEK for each drive. 5. The vSAN datastore is encrypted with each drive having its own DEK. 6. KMS generates a single Host Key HEK sent to all hosts in the cluster used for encrypting core dumps. Taken from vSAN 6.7 Deploy and Manage - Encryption Key Generation section
upvoted 3 times
...
Ady_14
3 years, 10 months ago
B is the right Answer
upvoted 2 times
...
adelbelkis2
3 years, 11 months ago
I believe B is correct from the link below "The KEK and Host Key are placed in memory in the key cache. These keys are not persistently stored on the vSAN hosts"
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...