Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02, GZO1)

Page: 1 / 7
Total 204 questions

Which cloud architecture model provides application development services?

A.

Security as a Service (SECaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

In which cloud service model is the cloud consumer responsible for installation and maintenance of the operating system?

A.

Network as a Service (NaaS)

B.

Platform as a Service (PaaS)

C.

Infrastructure as a Service (IaaS)

D.

Software as a Service (SaaS)

Which characteristic could affect the audit process for a customer of a cloud service provider?

A.

Lack of physical access to the cloud infrastructure

B.

Utilization constraints on the bandwidth imposed by the cloud service vendor

C.

Limits for up-time of the hosted system

D.

Restrictions on the data storage options offered by the cloud service provider

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Which document, commonly existing in an IT enterprise, can be used to speed up the process of identifying a potential cloud service provider (CSP)?

A.

Entity relationship and data flow diagrams

B.

Physical plant blueprint

C.

Business continuity and disaster recovery plan

D.

Egress safety design

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?

A.

China

B.

European Union

C.

Australia

D.

United States of America