WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)
Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?
An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?
Which group should be notified for approval when a planned modification to an environment is scheduled?
Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?
What is a benefit of federated identity and access management (IAM)?
An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?
Which cloud model provides retention of governance controls to a large company with legacy systems?
Which security information and event management concept focuses on account and service hijacking issues?
What is the first phase of identity management that is used to assert the identity of the user?
Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?
