Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Exam Practice Test

WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

Options:

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Question 2

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Question 3

Which platform component includes containers and storage?

Options:

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Question 4

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

Options:

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Question 5

Which process is implemented during the hardening of an operating system (OS) and its workloads?

Options:

A.

Change management

B.

Incident management

C.

Patch management

D.

Security management

Question 6

Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?

Options:

A.

Archive

B.

Store

C.

Create

D.

Share

Question 7

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

Options:

A.

Acceptance of liability for protection by the transferring entity

B.

Acknowledgement of liability for protection by the entity receiving the data transfer

C.

Demonstration of adequate level of protection similar to GDPR

D.

Formal consent of the data owner

Question 8

Which general body of law covers data breach violations in a cloud environment at a federal agency?

Options:

A.

Criminal

B.

Civil

C.

Administrative

D.

Tort

Question 9

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Question 10

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

Options:

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Question 11

Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?

Options:

A.

Software error

B.

Frequency

C.

Time

D.

Baseline

Question 12

In which service model would the cloud service provider bear the greatest responsibility for security?

Options:

A.

Database as a Service (DBaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

Question 13

Which cloud model is owned and operated by a vendor and then sold, leased, or rented to someone else?

Options:

A.

Private

B.

Hybrid

C.

Community

D.

Public

Question 14

Which activity is within the scope of the cloud provider’s role in the chain of custody?

Options:

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Question 15

Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?

Options:

A.

Transport Layer Security (TLS)

B.

Domain Name System (DNS)

C.

Clustered hosting

D.

Resource sharing

Question 16

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Question 17

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

Options:

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Question 18

Which security information and event management concept focuses on account and service hijacking issues?

Options:

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

Question 19

What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?

Options:

A.

Database replication

B.

Storage array replication

C.

Web application firewalls

D.

Backup generators

Question 20

Which type of risk comes from outsourcing significant vendor-specific investments for data, procedures, or processes to a cloud provider?

Options:

A.

Compliance

B.

Lock-in

C.

Overutilization

D.

Exit

Question 21

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

Options:

A.

Testing

B.

Training

C.

Planning

D.

Coding

Question 22

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Question 23

A company is interested in tokenization as an alternative to protecting data without encryption. The application will soon store the token. Which step should occur immediately before this action?

Options:

A.

The tokenization server generates the token for the application.

B.

The tokenization server returns the token to the application.

C.

An authorized application requests the token.

D.

Data is sent to the tokenization server.

Question 24

Which cloud model allows an on-premises data center to use cloud bursting?

Options:

A.

Public

B.

Hybrid

C.

Community

D.

Private

Question 25

Which guide remedies the challenge of the international nature of cloud forensics and is known for becoming the premier standard for eDiscovery?

Options:

A.

ISO/IEC 27042:2015

B.

ISO/IEC 27041:2015

C.

ISO/IEC 27050-1:2016

D.

ISO/IEC 27037:2012

Question 26

Which data retention policy addresses how long data must be retained to meet regulatory requirements?

Options:

A.

Formats

B.

Classification

C.

Retrieval

D.

Periods

Question 27

Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?

Options:

A.

Hardware security appliance

B.

Hybrid

C.

Virtual appliance

D.

Cloud provider service

Question 28

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

Options:

A.

Recovery time objective

B.

Data protection requirements

C.

SLA penalties

D.

Suspension of service clause

Question 29

Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?

Options:

A.

Object-based

B.

Volume

C.

Relational database

D.

File

Question 30

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Question 31

A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?

Options:

A.

Cloud customer

B.

IT department

C.

High-level government agencies

D.

Board of director members

Question 32

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

Options:

A.

Measured service

B.

Resource pooling

C.

On-demand self-service

D.

Rapid elasticity

Question 33

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.

Jurisdiction of the cloud provider and users

B.

Level of encryption that the cloud solution provides

C.

Configuration details specified in the contract

D.

Penalties specified in the service level agreement

Question 34

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML

B.

Database

C.

Object-based

D.

Volume

Question 35

Which jurisdictional protection factor should be known if personally identifiable information (PII) is to be stored in the cloud?

Options:

A.

Physical location of the web application firewall (WAF)

B.

Jurisdictional location of data

C.

Physical location of load balancer

D.

Jurisdictional location of availability zone

Question 36

An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?

Options:

A.

Consider options for portability and interoperability

B.

Enable multiple zones to mitigate service disruptions

C.

Revise contractual and personnel obligations

D.

Use best tools to securely connect to the cloud

Question 37

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Question 38

Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?

Options:

A.

Store

B.

Use

C.

Destroy

D.

Create

Question 39

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Question 40

Which risk is unique to the public cloud?

Options:

A.

Regulatory noncompliance

B.

Vendor lock-in

C.

Personnel threats

D.

Malware

Question 41

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Question 42

Which cloud architecture model provides application development services?

Options:

A.

Security as a Service (SECaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

Question 43

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

Options:

A.

Software development

B.

Procurement

C.

Quality assurance

D.

Marketing

Question 44

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Question 45

Which phase of the cloud data life cycle involves the process of crypto-shredding?

Options:

A.

Destroy

B.

Create

C.

Archive

D.

Store

Question 46

Which aspect of strong authentication is part of enterprise risk management?

Options:

A.

Federated identities

B.

Entitlement consideration

C.

Privileged user management

D.

Distributed organizations

Question 47

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Question 48

Which subject matter expert is relied upon to draft policies related to the organization’s operations in the cloud?

Options:

A.

Attorneys

B.

Risk management

C.

CCSP practitioner

D.

Senior management

Question 49

Which regulation restricts the government from forcing a cloud service provider to disclose customer data?

Options:

A.

GLBA

B.

SOX

C.

SCA

D.

ECPA

Question 50

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Question 51

Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?

Options:

A.

Internet of Things

B.

Cloud computing

C.

Big data

D.

Machine learning

Question 52

Which U.S. standard is used by federal government agencies to manage enterprise risk?

Options:

A.

International Organization for Standardization (ISO) 37500

B.

The Statement on Standards for Attestation Engagements 18 (SSAE 18)

C.

The Committee of Sponsoring Organizations (COSO) framework

D.

The National Institute of Standards and Technology (NIST) SP 800-37

Question 53

Which cloud model provides retention of governance controls to a large company with legacy systems?

Options:

A.

Private

B.

Public

C.

Community

D.

Hybrid

Question 54

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Question 55

What should be done to data during the create phase of the data life cycle before being uploaded to the cloud?

Options:

A.

Store

B.

Archive

C.

Share

D.

Encrypt

Question 56

Which entity provides common directory services?

Options:

A.

Remote Authentication Dial-In User Service

B.

Terminal Access Controller Access-Control System

C.

Domain Name System

D.

Lightweight Directory Access Protocol

Question 57

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege

Question 58

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Question 59

Which risk relates to the removal of a person’s information within the public cloud by legal authorities?

Options:

A.

Remote wiping

B.

Vendor lock-in

C.

Data masking

D.

Data seizure

Question 60

Which regulation provides a guide for implementing the risk management framework?

Options:

A.

NIST SP 800-37

B.

ISO 31000:2009

C.

ISO 27001

D.

PCI-DSS

Question 61

Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?

Options:

A.

Desktop as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)