New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)

Page: 2 / 3
Total 80 questions

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Which term describes data elements that, when combined with other information, are used to single out an individual?

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?

A.

Individual users’ private keys

B.

The organization's certificate repository server

C.

The organization's certificate authority server

D.

Individual systems' private keys

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

What is the process of identifying and procuring stored data as evidence for legal purposes?

A.

Chain of custody

B.

Forensic imaging

C.

Electronic discovery

D.

Gap analysis

When should a cloud service provider delete customer data?

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period