WGU Managing Cloud Security (JY02, GZO1) Questions and Answers
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which business continuity and disaster recovery consideration should be part of a cloud application architecture?
Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?
Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?
Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?
Which type of regulation governs credit card transactions as a part of cloud operations?
Which type of cloud security vulnerability is static application security testing (SAST) likely to find?
Which logical design model includes the foundations of a secure computing system, such as computing, networking, and storage?
Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?
An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?
An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?
Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?
Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?
Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?
Which security concept requires continuous identity and authorization checks to allow access to data?
Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?
What is a core goal of operating system (OS) baseline compliance and monitoring?
A warning system identifies an impending disaster. When should failover occur to ensure continuity of operations?
Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?
An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?
Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?
Which phase of the cloud data life cycle involves the process of crypto-shredding?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?
Which U.S. standard is used by federal government agencies to manage enterprise risk?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?
Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?
What is the first phase of identity management that is used to assert the identity of the user?
Which cloud computing service model allows customers to run their own application code without configuring the server environment?
Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?
An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
Which security risk is co-owned by the enterprise team and the cloud provider in the software as a service (SaaS) model?
Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?
Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?
Which security device allows customers to redirect traffic?
Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?
Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?
An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?
Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?
Which cloud storage design is based on a hierarchical system?
Which design principle of secure cloud computing ensures that users have access to a large number of resources that grow based on user demand?
A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?
Which security measure controls virtualization in the cloud?
Which security issue can be found only through dynamic application security testing (DAST)?
Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?
An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?
Which cloud computing role can subscribe to a software as a service (SaaS) application?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?
The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?
Which risk is unable to be highlighted from the outset in a cloud services contract?
Which security control could be implemented as part of a layered physical defense at a cloud hosting site?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?
Which steps should an organization take to avoid risk when dealing with software licensing?
Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?