Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)

Page: 6 / 7
Total 204 questions

Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?

A.

Guest escape

B.

Information bleed

C.

Software interoperability

D.

Web application security

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

A.

Virtual client

B.

Secure Shell

C.

Bastion host

D.

Host isolation

Which group should be notified for approval when a planned modification to an environment is scheduled?

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

What is a benefit of federated identity and access management (IAM)?

A.

Use of U.S. federal government identities

B.

Segregation of duties

C.

Disablement of CSP

D.

Use of an organization’s identities

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Which cloud model provides retention of governance controls to a large company with legacy systems?

A.

Private

B.

Public

C.

Community

D.

Hybrid

Which security information and event management concept focuses on account and service hijacking issues?

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

What is the first phase of identity management that is used to assert the identity of the user?

A.

Centralization

B.

Decentralization

C.

Provisioning

D.

Deprovisioning

Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?

A.

APP8

B.

Stored Communications Act (SCA)

C.

General Data Protection Regulation (GDPR)

D.

APP11.1