WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)
An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?
During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?
Which model does the Cloud Security Alliance (CSA) use as its standard for defining cloud computing?
Which logical consideration should be addressed when planning the design of a data center?
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?
Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?
Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?
Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?
How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?
