Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Managing-Cloud-Security WGU Managing Cloud Security (JY02) Questions and Answers

Questions 4

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

Options:

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols

Buy Now
Questions 5

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Buy Now
Questions 6

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Buy Now
Questions 7

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Buy Now
Questions 8

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Buy Now
Questions 9

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Buy Now
Questions 10

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Buy Now
Questions 11

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Buy Now
Questions 12

Which U.S. standard is used by federal government agencies to manage enterprise risk?

Options:

A.

International Organization for Standardization (ISO) 37500

B.

The Statement on Standards for Attestation Engagements 18 (SSAE 18)

C.

The Committee of Sponsoring Organizations (COSO) framework

D.

The National Institute of Standards and Technology (NIST) SP 800-37

Buy Now
Questions 13

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML

B.

Database

C.

Object-based

D.

Volume

Buy Now
Questions 14

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Buy Now
Questions 15

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

Options:

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Buy Now
Questions 16

An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?

Options:

A.

The results of the organization's most recent privacy audit

B.

A notice of any contractual obligations that do not align with the privacy policy

C.

A copy of federal privacy laws regarding unauthorized data disclosure

D.

The organization's privacy policy and handling practices

Buy Now
Questions 17

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Buy Now
Questions 18

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Buy Now
Questions 19

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

Options:

A.

One-way hashing

B.

Degaussing

C.

Overwriting

D.

Cryptographic erasure

Buy Now
Questions 20

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

Options:

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Buy Now
Questions 21

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Buy Now
Questions 22

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

Options:

A.

Performance efficiency

B.

Operational excellence

C.

Reliability

D.

Sustainability

Buy Now
Questions 23

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 24

Which phase of the cloud data life cycle involves the process of crypto-shredding?

Options:

A.

Destroy

B.

Create

C.

Archive

D.

Store

Buy Now
Exam Name: WGU Managing Cloud Security (JY02)
Last Update: Oct 5, 2025
Questions: 80

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99