Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > WGU > Courses and Certificates > Managing-Cloud-Security

Managing-Cloud-Security WGU Managing Cloud Security (JY02) Question and Answers

Question # 4

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Full Access
Question # 5

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Full Access
Question # 6

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Full Access
Question # 7

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

Full Access
Question # 8

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Full Access
Question # 9

Which action should be taken to ensure that unencrypted network traffic is protected?

A.

Data should be transmitted using the secure socket layer (SSL) protocol.

B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).

C.

Data should be transmitted using generic routing encapsulation (GRE).

D.

Data should be transmitted using the transport layer security (TLS) protocol.

Full Access
Question # 10

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Full Access
Question # 11

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Full Access
Question # 12

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Full Access
Question # 13

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Full Access
Question # 14

Which term describes data elements that, when combined with other information, are used to single out an individual?

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Full Access
Question # 15

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Full Access
Question # 16

Which platform component includes containers and storage?

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Full Access
Question # 17

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

A.

Software development

B.

Procurement

C.

Quality assurance

D.

Marketing

Full Access
Question # 18

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

Full Access
Question # 19

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Full Access
Question # 20

Which group should be notified for approval when a planned modification to an environment is scheduled?

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Full Access
Question # 21

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Full Access
Question # 22

Which security concept requires continuous identity and authorization checks to allow access to data?

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Full Access
Question # 23

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

Full Access
Question # 24

What is the process of identifying and procuring stored data as evidence for legal purposes?

A.

Chain of custody

B.

Forensic imaging

C.

Electronic discovery

D.

Gap analysis

Full Access