New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)

Page: 1 / 3
Total 80 questions

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

A.

Testing

B.

Training

C.

Planning

D.

Coding

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service