WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?
An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?
A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?
