WGU Managing-Cloud-Security - WGU Managing Cloud Security (JY02)
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?
Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?
A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?
Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
