New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)

Page: 3 / 3
Total 80 questions

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.