Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02) Exam Practice Test

WGU Managing Cloud Security (JY02) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Question 2

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Question 3

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Question 4

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Question 5

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

Options:

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Question 6

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

Options:

A.

Continuous monitoring

B.

Confidential computing

C.

Regulatory oversight

D.

Incident management

Question 7

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Question 8

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Question 9

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

Options:

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Question 10

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Question 11

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Question 12

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Question 13

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

Options:

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

Question 14

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Question 15

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Question 16

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

Options:

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Question 17

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

Options:

A.

On-path

B.

Injection

C.

Credential

D.

Denial-of-service

Question 18

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Question 19

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Question 20

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

Options:

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Question 21

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Question 22

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

Options:

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Question 23

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

Options:

A.

Testing

B.

Training

C.

Planning

D.

Coding

Question 24

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats