Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Questions 4

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

Options:

A.

Recovery time objective

B.

Data protection requirements

C.

SLA penalties

D.

Suspension of service clause

Buy Now
Questions 5

Which process is implemented during the hardening of an operating system (OS) and its workloads?

Options:

A.

Change management

B.

Incident management

C.

Patch management

D.

Security management

Buy Now
Questions 6

Which security testing method requires compliance with the cloud service provider’s terms of service?

Options:

A.

Vulnerability assessment

B.

Continuous delivery pipeline

C.

Static analysis

D.

Code review

Buy Now
Questions 7

Which security threat occurs when authorized users increase their level of access in an unauthorized manner?

Options:

A.

Escalation of privilege

B.

Man-in-the-middle

C.

Role assumption

D.

Segregation of duties

Buy Now
Questions 8

Which risk is unique to the public cloud?

Options:

A.

Regulatory noncompliance

B.

Vendor lock-in

C.

Personnel threats

D.

Malware

Buy Now
Questions 9

Which jurisdictional data protection was enacted in the United States to avoid forced disclosure from ISPs?

Options:

A.

APP8

B.

Stored Communications Act (SCA)

C.

General Data Protection Regulation (GDPR)

D.

APP11.1

Buy Now
Questions 10

A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?

Options:

A.

Cloud customer

B.

IT department

C.

High-level government agencies

D.

Board of director members

Buy Now
Questions 11

Which service model requires the most consumer responsibility for security issues?

Options:

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (DBaaS)

D.

Infrastructure as a Service (IaaS)

Buy Now
Questions 12

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

Options:

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Buy Now
Questions 13

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Buy Now
Questions 14

Which security information and event management concept focuses on account and service hijacking issues?

Options:

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

Buy Now
Questions 15

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Buy Now
Questions 16

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

Options:

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

Buy Now
Questions 17

What is a benefit of federated identity and access management (IAM)?

Options:

A.

Use of U.S. federal government identities

B.

Segregation of duties

C.

Disablement of CSP

D.

Use of an organization’s identities

Buy Now
Questions 18

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Buy Now
Questions 19

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Buy Now
Questions 20

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Buy Now
Questions 21

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

Options:

A.

HIPAA

B.

GDPR

C.

COPPA

D.

APPI

Buy Now
Questions 22

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

Options:

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Buy Now
Questions 23

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Buy Now
Questions 24

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

Options:

A.

Virtual client

B.

Secure Shell

C.

Bastion host

D.

Host isolation

Buy Now
Questions 25

Which concept focuses on operating highly available workloads in the cloud?

Options:

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Buy Now
Questions 26

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

Options:

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization

Buy Now
Questions 27

Which risk is unable to be highlighted from the outset in a cloud services contract?

Options:

A.

Introduction of new technology

B.

Sunsetting of aging technology

C.

Result of an unforeseen event

D.

Changes resulting from contract renewals

Buy Now
Questions 28

Which aspect of access management safeguards data by determining the user's rights to a certain resource?

Options:

A.

Provisioning

B.

Authorization

C.

Authentication

D.

Centralization

Buy Now
Questions 29

Which action should be taken to preserve forensic evidence for collection?

Options:

A.

Implementing serverless architectures

B.

Enabling threat modeling

C.

Pausing the virtual machine

D.

Enforcing mutable servers

Buy Now
Questions 30

A cloud consumer is scheduling a vulnerability assessment of a cloud service procured through a cloud broker. Who should the cloud consumer notify before beginning the assessment?

Options:

A.

The cloud broker

B.

The cloud consumer’s legal department

C.

The cloud consumer’s customers

D.

The cloud service provider

Buy Now
Questions 31

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.

Jurisdiction of the cloud provider and users

B.

Level of encryption that the cloud solution provides

C.

Configuration details specified in the contract

D.

Penalties specified in the service level agreement

Buy Now
Questions 32

A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?

Options:

A.

Sniffed network ports

B.

Cloud service provider audit logs

C.

Host agent intrusion detection system

D.

Redundant network firewalls

Buy Now
Questions 33

Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?

Options:

A.

China

B.

European Union

C.

Australia

D.

United States of America

Buy Now
Questions 34

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

Options:

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Buy Now
Questions 35

Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?

Options:

A.

Inefficient bandwidth utilization

B.

Perimeter security breach

C.

Data breach

D.

Crypto-shredding

Buy Now
Questions 36

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML

B.

Database

C.

Object-based

D.

Volume

Buy Now
Questions 37

Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?

Options:

A.

Natural disasters

B.

Outages

C.

Fast run time

D.

Homomorphic encryption

Buy Now
Questions 38

Which cloud model is owned and operated by a vendor and then sold, leased, or rented to someone else?

Options:

A.

Private

B.

Hybrid

C.

Community

D.

Public

Buy Now
Questions 39

Which subject matter expert is relied upon to draft policies related to the organization’s operations in the cloud?

Options:

A.

Attorneys

B.

Risk management

C.

CCSP practitioner

D.

Senior management

Buy Now
Questions 40

Which security strategy is associated with data rights management solutions?

Options:

A.

Persistent protection

B.

Multilevel aggregation

C.

Enhanced detail

D.

Unexpired digital content

Buy Now
Questions 41

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege

Buy Now
Questions 42

Which type of cloud security vulnerability is static application security testing (SAST) likely to find?

Options:

A.

Software misconfiguration

B.

Embedded credentials

C.

Hypervisor vulnerabilities

D.

Run-time vulnerabilities

Buy Now
Questions 43

Which type of regulation governs credit card transactions as a part of cloud operations?

Options:

A.

GLBA

B.

PCI DSS

C.

SOX

D.

HIPAA

Buy Now
Questions 44

Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?

Options:

A.

Desktop as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 45

Which regulation provides a guide for implementing the risk management framework?

Options:

A.

NIST SP 800-37

B.

ISO 31000:2009

C.

ISO 27001

D.

PCI-DSS

Buy Now
Questions 46

Which of the following is an iterative software development methodology that focuses on achieving customer satisfaction by delivering the software early in the process and welcoming changing requirements from the customer, even late in the process?

Options:

A.

Agile

B.

Spiral

C.

Waterfall

D.

Lean

Buy Now
Questions 47

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Buy Now
Questions 48

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Buy Now
Questions 49

Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?

Options:

A.

Transport Layer Security (TLS)

B.

Domain Name System (DNS)

C.

Clustered hosting

D.

Resource sharing

Buy Now
Questions 50

Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?

Options:

A.

Guest escape

B.

Information bleed

C.

Software interoperability

D.

Web application security

Buy Now
Questions 51

A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?

Options:

A.

Informational logs and message of the day

B.

Environmental errors and 802.1x logs

C.

User identifications and access timestamps

D.

User commands and error timestamps

Buy Now
Questions 52

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 53

Which cloud storage design is based on a hierarchical system?

Options:

A.

Database

B.

Block

C.

File

D.

Object

Buy Now
Questions 54

What is a core goal of operating system (OS) baseline compliance and monitoring?

Options:

A.

Meet the required service levels as specified in the SLA

B.

Isolate customer traffic traveling over multi-tenant networks

C.

Separate customer data in multi-tenant hosting environments

D.

Ensure virtual images satisfy baseline configuration requirements

Buy Now
Questions 55

Which security control is a countermeasure against vendor lock-in and lock-out?

Options:

A.

Offsite backups

B.

Video surveillance

C.

Disk redundancy

D.

Training programs

Buy Now
Questions 56

Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?

Options:

A.

Quality of Service (QoS)

B.

Distributed Denial of Service (DDoS)

C.

Intrusion Detection System (IDS)

D.

Runtime Application Self-Protection (RASP)

Buy Now
Questions 57

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Buy Now
Questions 58

Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?

Options:

A.

Cloud provider

B.

Instance provider

C.

Cloud controller

D.

UniFi controller

Buy Now
Questions 59

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Buy Now
Questions 60

In which service model would the cloud service provider bear the greatest responsibility for security?

Options:

A.

Database as a Service (DBaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

Buy Now
Questions 61

What is the definition of transportable as it relates to cloud contract design requirements?

Options:

A.

Available to be accessed by mobile devices

B.

Able to be moved to another vendor

C.

Available in a proprietary format

D.

Able to be archived quickly

Buy Now
Exam Name: WGU Managing Cloud Security (JY02, GZO1)
Last Update: Feb 25, 2026
Questions: 204

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99