Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)

Page: 4 / 7
Total 204 questions

Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?

A.

Archive

B.

Store

C.

Create

D.

Share

Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?

A.

Tabletop

B.

Dry run

C.

Parallel

D.

Full

A warning system identifies an impending disaster. When should failover occur to ensure continuity of operations?

A.

Prior to the crisis event

B.

During the resumption of normal activities

C.

During the crisis event

D.

Prior to the resumption of normal activities

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

A.

Long-running VMs that still run standard security controls may be isolated on the network.

B.

They are locked down more than the usual servers and tend to run a smaller set of services.

C.

The traditional tools are not normally designed for that degree of velocity.

D.

Some agents require opening additional firewall ports, which increases the network attack surface.

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?

A.

Quality of Service (QoS)

B.

Distributed Denial of Service (DDoS)

C.

Intrusion Detection System (IDS)

D.

Runtime Application Self-Protection (RASP)

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Which cloud platform detection and analysis methodology can be performed to determine whether other similar instances were potentially exposed during the same attack?

A.

Reviewing application logs

B.

Examining network flows

C.

Reviewing log data

D.

Examining configuration data