Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium WGU Managing-Cloud-Security Dumps Questions Answers

WGU Managing Cloud Security (JY02) Questions and Answers

Question 1

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Buy Now
Question 2

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Question 3

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

Options:

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Question 4

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Question 5

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Question 6

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Question 7

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Question 8

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege

Question 9

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Question 10

An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?

Options:

A.

Verifying the details of the contract and arrangements for data transfer

B.

Ensuring the vendor has securely destroyed all confidential information

C.

Identifying the business need the vendor will address

D.

Deciding how to respond to the request for proposal (RFP)

Question 11

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Question 12

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

Options:

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Question 13

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Question 14

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Question 15

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Question 16

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

Options:

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Question 17

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Question 18

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Question 19

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation

B.

Physical destruction

C.

Overwriting

D.

Degaussing

Question 20

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Question 21

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

Options:

A.

Performance efficiency

B.

Operational excellence

C.

Reliability

D.

Sustainability

Question 22

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Question 23

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Question 24

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

Options:

A.

Conflicting regulations in different jurisdictions

B.

Collection and use of genetic information

C.

Data breach notification requirements

D.

Use of digital surveillance by multinational employers