Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF Managing-Cloud-Security Study Guide

WGU Managing Cloud Security (JY02) Questions and Answers

Question 5

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Question 6

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Question 7

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Question 8

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege