WGU Managing Cloud Security (JY02) Questions and Answers
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?
Which concept focuses on operating highly available workloads in the cloud?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?
An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?
An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?
An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?
An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which security concept requires continuous identity and authorization checks to allow access to data?
Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?
An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?
An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?
In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?
An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?