Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Questions and Answers
Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?
Which process is implemented during the hardening of an operating system (OS) and its workloads?
Which security testing method requires compliance with the cloud service provider’s terms of service?
Which security threat occurs when authorized users increase their level of access in an unauthorized manner?
Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?
A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?
Which service model requires the most consumer responsibility for security issues?
What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?
An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?
Which security information and event management concept focuses on account and service hijacking issues?
A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?
Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?
After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?
As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?
Which group should be notified for approval when a planned modification to an environment is scheduled?
Which legal framework is concerned with the privacy of data of EU/EEA citizens?
Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?
Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?
An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?
A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?
Which risk is unable to be highlighted from the outset in a cloud services contract?
Which aspect of access management safeguards data by determining the user's rights to a certain resource?
A cloud consumer is scheduling a vulnerability assessment of a cloud service procured through a cloud broker. Who should the cloud consumer notify before beginning the assessment?
Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?
A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?
Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?
As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?
Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?
Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?
Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?
Which cloud model is owned and operated by a vendor and then sold, leased, or rented to someone else?
Which subject matter expert is relied upon to draft policies related to the organization’s operations in the cloud?
An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?
Which type of cloud security vulnerability is static application security testing (SAST) likely to find?
Which type of regulation governs credit card transactions as a part of cloud operations?
Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?
Which regulation provides a guide for implementing the risk management framework?
Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?
An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?
An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?
Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?
Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?
A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?
An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?
What is a core goal of operating system (OS) baseline compliance and monitoring?
Which security control is a countermeasure against vendor lock-in and lock-out?
Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?
An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?
Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?
An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?
In which service model would the cloud service provider bear the greatest responsibility for security?
What is the definition of transportable as it relates to cloud contract design requirements?