Spring Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

Managing-Cloud-Security Sample Questions Answers

Questions 4

In which service model would the cloud service provider bear the greatest responsibility for security?

Options:

A.

Database as a Service (DBaaS)

B.

Software as a Service (SaaS)

C.

Platform as a Service (PaaS)

D.

Infrastructure as a Service (IaaS)

Buy Now
Questions 5

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Buy Now
Questions 6

What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?

Options:

A.

Database replication

B.

Storage array replication

C.

Web application firewalls

D.

Backup generators

Buy Now
Questions 7

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks

B.

Cameras

C.

Bollards

D.

Fences

Buy Now
Questions 8

Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?

Options:

A.

Tabletop

B.

Dry run

C.

Parallel

D.

Full

Buy Now
Questions 9

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

Options:

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Buy Now
Questions 10

Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?

Options:

A.

Extensible markup language (XML) gateway

B.

Web application firewall (WAF)

C.

Network-based database activity monitor (NDAM)

D.

Agent-based database activity monitor (ADAM)

Buy Now
Questions 11

Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?

Options:

A.

Cloud provider

B.

Instance provider

C.

Cloud controller

D.

UniFi controller

Buy Now
Questions 12

Which security threat occurs when authorized users increase their level of access in an unauthorized manner?

Options:

A.

Escalation of privilege

B.

Man-in-the-middle

C.

Role assumption

D.

Segregation of duties

Buy Now
Questions 13

Which general body of law covers data breach violations in a cloud environment at a federal agency?

Options:

A.

Criminal

B.

Civil

C.

Administrative

D.

Tort

Buy Now
Questions 14

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.

Jurisdiction of the cloud provider and users

B.

Level of encryption that the cloud solution provides

C.

Configuration details specified in the contract

D.

Penalties specified in the service level agreement

Buy Now
Questions 15

Which management process involves multiple key holders, each with access to a portion of the information?

Options:

A.

Recovery

B.

Revocation

C.

Distribution

D.

Escrow

Buy Now
Questions 16

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 17

Which process is implemented during the hardening of an operating system (OS) and its workloads?

Options:

A.

Change management

B.

Incident management

C.

Patch management

D.

Security management

Buy Now
Questions 18

Which means of access management is used to determine whether someone is a legitimate user?

Options:

A.

Authentication

B.

Authorization

C.

Federation

D.

Policy management

Buy Now
Questions 19

Which security strategy is associated with data rights management solutions?

Options:

A.

Persistent protection

B.

Multilevel aggregation

C.

Enhanced detail

D.

Unexpired digital content

Buy Now
Questions 20

Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?

Options:

A.

Guest escape

B.

Information bleed

C.

Software interoperability

D.

Web application security

Buy Now
Questions 21

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 22

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

Options:

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Buy Now
Questions 23

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

Options:

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Buy Now
Questions 24

Which requirement in the Gramm-Leach-Bliley Act (GLBA) is included to protect private data?

Options:

A.

Independent auditor

B.

Gap analysis

C.

Information security plan

D.

Limited scope definition

Buy Now
Questions 25

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

Options:

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Buy Now
Questions 26

Which concept focuses on operating highly available workloads in the cloud?

Options:

A.

Resource hierarchy

B.

Security

C.

Operational excellence

D.

Reliability

Buy Now
Questions 27

Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?

Options:

A.

Hardware security appliance

B.

Hybrid

C.

Virtual appliance

D.

Cloud provider service

Buy Now
Questions 28

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

Options:

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Buy Now
Questions 29

Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?

Options:

A.

Cloud user

B.

Data controller

C.

Cloud provider

D.

Data subject

Buy Now
Questions 30

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

Options:

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues

Buy Now
Questions 31

Which logical consideration should be addressed when planning the design of a data center?

Options:

A.

Multitenancy of networks

B.

Heating and cooling

C.

Ability for expansion

D.

Utility power availability

Buy Now
Questions 32

What is a core goal of operating system (OS) baseline compliance and monitoring?

Options:

A.

Meet the required service levels as specified in the SLA

B.

Isolate customer traffic traveling over multi-tenant networks

C.

Separate customer data in multi-tenant hosting environments

D.

Ensure virtual images satisfy baseline configuration requirements

Buy Now
Questions 33

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Buy Now
Questions 34

Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?

Options:

A.

IDEA

B.

DMCA

C.

FERPA

D.

GLBA

Buy Now
Questions 35

Which data source provides auditability and traceability for event investigation as well as documentation?

Options:

A.

Block storage

B.

Object storage

C.

Database logs

D.

Database rows

Buy Now
Questions 36

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Buy Now
Questions 37

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Buy Now
Questions 38

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Buy Now
Questions 39

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

Options:

A.

HIPAA

B.

GDPR

C.

COPPA

D.

APPI

Buy Now
Questions 40

Which security device allows customers to redirect traffic?

Options:

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

Buy Now
Questions 41

Which cloud computing role can subscribe to a software as a service (SaaS) application?

Options:

A.

Cloud service customer

B.

Cloud computing

C.

Cloud service provider

D.

Cloud application

Buy Now
Questions 42

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Buy Now
Questions 43

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Buy Now
Questions 44

Which service model requires the most consumer responsibility for security issues?

Options:

A.

Platform as a Service (PaaS)

B.

Software as a Service (SaaS)

C.

Database as a Service (DBaaS)

D.

Infrastructure as a Service (IaaS)

Buy Now
Questions 45

Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?

Options:

A.

Sandboxing

B.

Threat modeling

C.

Application virtualization

D.

Multitenancy

Buy Now
Questions 46

Which cloud storage design is based on a hierarchical system?

Options:

A.

Database

B.

Block

C.

File

D.

Object

Buy Now
Questions 47

Which model does the Cloud Security Alliance (CSA) use as its standard for defining cloud computing?

Options:

A.

SOX

B.

SOC 3

C.

NIST

D.

SAS 70

Buy Now
Questions 48

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

Options:

A.

Long-running VMs that still run standard security controls may be isolated on the network.

B.

They are locked down more than the usual servers and tend to run a smaller set of services.

C.

The traditional tools are not normally designed for that degree of velocity.

D.

Some agents require opening additional firewall ports, which increases the network attack surface.

Buy Now
Questions 49

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Buy Now
Questions 50

Which factor should be the basis of a business continuity plan?

Options:

A.

Costs

B.

Risks

C.

Customers

D.

Locations

Buy Now
Questions 51

A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?

Options:

A.

Multi-layer control

B.

Tertiary control

C.

Ancillary control

D.

Compensating control

Buy Now
Questions 52

When should a cloud service provider delete customer data?

Options:

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

Buy Now
Questions 53

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

Options:

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Buy Now
Questions 54

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Buy Now
Questions 55

Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?

Options:

A.

Internet of Things

B.

Cloud computing

C.

Big data

D.

Machine learning

Buy Now
Questions 56

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Buy Now
Questions 57

Which description accurately characterizes the movement of applications to the cloud?

Options:

A.

In a desktop as a service (DaaS) environment, the customer is responsible for securing the underlying infrastructure.

B.

In an infrastructure as a service (IaaS) environment, the CSP is responsible for securing the platform.

C.

In a platform as a service (PaaS) environment, the customer is responsible for securing the underlying infrastructure.

D.

In a software as a service (SaaS) environment, the CSP is responsible for securing the platform.

Buy Now
Questions 58

Which item must be examined in detail when evaluating the risks associated with a new software as a service (SaaS) solution?

Options:

A.

Use of low-level accounts for administrative tasks

B.

Leverage of multi-factor authentication for all cloud access

C.

Historical availability of services

D.

Maintenance releases or patches to install

Buy Now
Questions 59

An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?

Options:

A.

Consider options for portability and interoperability

B.

Enable multiple zones to mitigate service disruptions

C.

Revise contractual and personnel obligations

D.

Use best tools to securely connect to the cloud

Buy Now
Questions 60

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

Options:

A.

Measured service

B.

Resource pooling

C.

On-demand self-service

D.

Rapid elasticity

Buy Now
Questions 61

A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?

Options:

A.

Informational logs and message of the day

B.

Environmental errors and 802.1x logs

C.

User identifications and access timestamps

D.

User commands and error timestamps

Buy Now
Exam Code: Managing-Cloud-Security
Exam Name: WGU Managing Cloud Security (JY02, GZO1)
Last Update: Mar 3, 2026
Questions: 204
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now Managing-Cloud-Security