Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

PDF Managing-Cloud-Security Study Guide

WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Question 5

Which aspect of strong authentication is part of enterprise risk management?

Options:

A.

Federated identities

B.

Entitlement consideration

C.

Privileged user management

D.

Distributed organizations

Question 6

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Question 7

Which action should be taken to ensure that unencrypted network traffic is protected?

Options:

A.

Data should be transmitted using the secure socket layer (SSL) protocol.

B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).

C.

Data should be transmitted using generic routing encapsulation (GRE).

D.

Data should be transmitted using the transport layer security (TLS) protocol.

Question 8

Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?

Options:

A.

Physical location of the web application firewall (WAF)

B.

Jurisdictional location of data

C.

Physical location of load balancer

D.

Jurisdictional location of availability zone