Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)

Page: 5 / 7
Total 204 questions

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Which cloud infrastructure risk is the responsibility of the cloud provider?

A.

Physical security

B.

Data security

C.

Application security

D.

Security governance

Which phase of the software development life cycle includes creating user stories?

A.

Developing

B.

Designing

C.

Defining

D.

Planning

Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?

A.

Physical location of the web application firewall (WAF)

B.

Jurisdictional location of data

C.

Physical location of load balancer

D.

Jurisdictional location of availability zone

Which concept focuses on operating highly available workloads in the cloud?

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Which process is implemented during the hardening of an operating system (OS) and its workloads?

A.

Change management

B.

Incident management

C.

Patch management

D.

Security management

Which security device allows customers to redirect traffic?

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

Which management process involves multiple key holders, each with access to a portion of the information?

A.

Recovery

B.

Revocation

C.

Distribution

D.

Escrow

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling