Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)

Page: 2 / 7
Total 204 questions

An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?

A.

The results of the organization's most recent privacy audit

B.

A notice of any contractual obligations that do not align with the privacy policy

C.

A copy of federal privacy laws regarding unauthorized data disclosure

D.

The organization's privacy policy and handling practices

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Which model does the Cloud Security Alliance (CSA) use as its standard for defining cloud computing?

A.

SOX

B.

SOC 3

C.

NIST

D.

SAS 70

Which logical consideration should be addressed when planning the design of a data center?

A.

Multitenancy of networks

B.

Heating and cooling

C.

Ability for expansion

D.

Utility power availability

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

A.

XML

B.

Database

C.

Object-based

D.

Volume

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

A.

One-way hashing

B.

Degaussing

C.

Overwriting

D.

Cryptographic erasure

Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?

A.

Sandboxing

B.

Threat modeling

C.

Application virtualization

D.

Multitenancy

Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?

A.

Internet of Things

B.

Cloud computing

C.

Big data

D.

Machine learning

How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?

A.

Using round-robin load balancing

B.

Rerouting traffic to the mitigation services

C.

Having multiple endpoints

D.

Scaling the receiving application