Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Courses and Certificates Managing-Cloud-Security Book

WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Question 53

Which security risk is co-owned by the enterprise team and the cloud provider in the software as a service (SaaS) model?

Options:

A.

Application

B.

Data

C.

Physical

D.

Platform

Question 54

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation

B.

Physical destruction

C.

Overwriting

D.

Degaussing

Question 55

Which data source provides auditability and traceability for event investigation as well as documentation?

Options:

A.

Block storage

B.

Object storage

C.

Database logs

D.

Database rows

Question 56

Which tier from Uptime Institute's Data Center Site Infrastructure Tier Standards is considered to be the most secure, reliable, and redundant in design and operational elements?

Options:

A.

Tier IV

B.

Tier I

C.

Tier II

D.

Tier III