Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

WGU Managing-Cloud-Security Dumps

WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Question 1

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML

B.

Database

C.

Object-based

D.

Volume

Question 2

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Question 3

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

Options:

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues

Question 4

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

Options:

A.

Performance efficiency

B.

Operational excellence

C.

Reliability

D.

Sustainability

Question 5

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Question 6

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

Options:

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

Question 7

Which type of regulation governs credit card transactions as a part of cloud operations?

Options:

A.

GLBA

B.

PCI DSS

C.

SOX

D.

HIPAA

Question 8

Which type of cloud security vulnerability is static application security testing (SAST) likely to find?

Options:

A.

Software misconfiguration

B.

Embedded credentials

C.

Hypervisor vulnerabilities

D.

Run-time vulnerabilities

Question 9

Which logical design model includes the foundations of a secure computing system, such as computing, networking, and storage?

Options:

A.

Infrastructure

B.

Infostructure

C.

Metastructure

D.

Applistructure

Question 10

Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?

Options:

A.

Apache OpenStack

B.

Hypervisor

C.

VMware vSphere

D.

Open Web Application Security Project

Question 11

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Question 12

An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?

Options:

A.

Verifying the details of the contract and arrangements for data transfer

B.

Ensuring the vendor has securely destroyed all confidential information

C.

Identifying the business need the vendor will address

D.

Deciding how to respond to the request for proposal (RFP)

Question 13

Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?

Options:

A.

Physical location of the web application firewall (WAF)

B.

Jurisdictional location of data

C.

Physical location of load balancer

D.

Jurisdictional location of availability zone

Question 14

Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?

Options:

A.

APP8

B.

Stored Communications Act (SCA)

C.

General Data Protection Regulation (GDPR)

D.

APP11.1

Question 15

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

Options:

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Question 16

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Question 17

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

Options:

A.

Acceptance of liability for protection by the transferring entity

B.

Acknowledgement of liability for protection by the entity receiving the data transfer

C.

Demonstration of adequate level of protection similar to GDPR

D.

Formal consent of the data owner

Question 18

What is a core goal of operating system (OS) baseline compliance and monitoring?

Options:

A.

Meet the required service levels as specified in the SLA

B.

Isolate customer traffic traveling over multi-tenant networks

C.

Separate customer data in multi-tenant hosting environments

D.

Ensure virtual images satisfy baseline configuration requirements

Question 19

A warning system identifies an impending disaster. When should failover occur to ensure continuity of operations?

Options:

A.

Prior to the crisis event

B.

During the resumption of normal activities

C.

During the crisis event

D.

Prior to the resumption of normal activities

Question 20

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.

Jurisdiction of the cloud provider and users

B.

Level of encryption that the cloud solution provides

C.

Configuration details specified in the contract

D.

Penalties specified in the service level agreement

Question 21

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Question 22

Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?

Options:

A.

China

B.

European Union

C.

Australia

D.

United States of America

Question 23

Which phase of the cloud data life cycle involves the process of crypto-shredding?

Options:

A.

Destroy

B.

Create

C.

Archive

D.

Store

Question 24

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Question 25

Which U.S. standard is used by federal government agencies to manage enterprise risk?

Options:

A.

International Organization for Standardization (ISO) 37500

B.

The Statement on Standards for Attestation Engagements 18 (SSAE 18)

C.

The Committee of Sponsoring Organizations (COSO) framework

D.

The National Institute of Standards and Technology (NIST) SP 800-37

Question 26

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Question 27

Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?

Options:

A.

Software error

B.

Frequency

C.

Time

D.

Baseline

Question 28

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Question 29

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Question 30

What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?

Options:

A.

Database replication

B.

Storage array replication

C.

Web application firewalls

D.

Backup generators

Question 31

What is the first phase of identity management that is used to assert the identity of the user?

Options:

A.

Centralization

B.

Decentralization

C.

Provisioning

D.

Deprovisioning

Question 32

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Question 33

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Question 34

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

Options:

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Question 35

Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?

Options:

A.

Transport Layer Security (TLS)

B.

Domain Name System (DNS)

C.

Clustered hosting

D.

Resource sharing

Question 36

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

Options:

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Question 37

Which security risk is co-owned by the enterprise team and the cloud provider in the software as a service (SaaS) model?

Options:

A.

Application

B.

Data

C.

Physical

D.

Platform

Question 38

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

Options:

A.

Recovery time objective

B.

Data protection requirements

C.

SLA penalties

D.

Suspension of service clause

Question 39

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

Options:

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

Question 40

Which security device allows customers to redirect traffic?

Options:

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

Question 41

Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?

Options:

A.

Inefficient bandwidth utilization

B.

Perimeter security breach

C.

Data breach

D.

Crypto-shredding

Question 42

Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?

Options:

A.

Risk transfer

B.

Vulnerability assessment

C.

Business impact analysis

D.

Out-of-band validation

Question 43

An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?

Options:

A.

Network firewall rules

B.

Provider compliance attestation

C.

Operating system patch logs

D.

Physical diagram of the data center

Question 44

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

Options:

A.

One-way hashing

B.

Degaussing

C.

Overwriting

D.

Cryptographic erasure

Question 45

Which cloud storage design is based on a hierarchical system?

Options:

A.

Database

B.

Block

C.

File

D.

Object

Question 46

Which design principle of secure cloud computing ensures that users have access to a large number of resources that grow based on user demand?

Options:

A.

Resource pooling

B.

Collaboration

C.

Virtualization

D.

Rapid elasticity

Question 47

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Question 48

Which security measure controls virtualization in the cloud?

Options:

A.

Monitoring and logging

B.

Using a dedicated hosting

C.

Managing image assets

D.

Securing the hypervisor

Question 49

Which security issue can be found only through dynamic application security testing (DAST)?

Options:

A.

Code quality

B.

Null pointer dereference

C.

Insecure cryptographic function

D.

Runtime privileges

Question 50

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

Options:

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Question 51

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Question 52

Which cloud computing role can subscribe to a software as a service (SaaS) application?

Options:

A.

Cloud service customer

B.

Cloud computing

C.

Cloud service provider

D.

Cloud application

Question 53

Which security threat occurs when authorized users increase their level of access in an unauthorized manner?

Options:

A.

Escalation of privilege

B.

Man-in-the-middle

C.

Role assumption

D.

Segregation of duties

Question 54

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Question 55

The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?

Options:

A.

Logical

B.

Regulatory

C.

Environmental

D.

Physical

Question 56

Which risk is unable to be highlighted from the outset in a cloud services contract?

Options:

A.

Introduction of new technology

B.

Sunsetting of aging technology

C.

Result of an unforeseen event

D.

Changes resulting from contract renewals

Question 57

Which security control could be implemented as part of a layered physical defense at a cloud hosting site?

Options:

A.

Access control enforcement

B.

Background checks

C.

Video surveillance capability

D.

Multifactor authentication

Question 58

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

Options:

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Question 59

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Question 60

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.

It should ensure it has the correct type of license.

B.

It should ensure it has the correct location to store licenses.

C.

It should ensure it only uses closed-source licenses.

D.

It should ensure it only uses open-source licenses.

Question 61

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

Options:

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Page: 1 / 20
Total 204 questions