Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

WGU Managing-Cloud-Security Dumps

WGU Managing Cloud Security (JY02) Questions and Answers

Question 1

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Question 2

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Question 3

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Question 4

Which concept focuses on operating highly available workloads in the cloud?

Options:

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Question 5

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege

Question 6

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

Options:

A.

Virtual client

B.

Secure Shell

C.

Bastion host

D.

Host isolation

Question 7

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

Options:

A.

Continuous monitoring

B.

Confidential computing

C.

Regulatory oversight

D.

Incident management

Question 8

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

Options:

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Question 9

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Question 10

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Question 11

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Question 12

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Question 13

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Question 14

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

Options:

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

Question 15

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

Options:

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Question 16

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

Options:

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Question 17

An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?

Options:

A.

Individual users’ private keys

B.

The organization's certificate repository server

C.

The organization's certificate authority server

D.

Individual systems' private keys

Question 18

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

Options:

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Question 19

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Question 20

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Question 21

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Question 22

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Question 23

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation

B.

Physical destruction

C.

Overwriting

D.

Degaussing

Question 24

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

Options:

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Page: 1 / 8
Total 80 questions