WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?
Which term describes data elements that, when combined with other information, are used to single out an individual?
An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?
An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?
Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?
A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?
What is the process of identifying and procuring stored data as evidence for legal purposes?
When should a cloud service provider delete customer data?
