Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Managing-Cloud-Security WGU Managing Cloud Security (JY02) Questions and Answers

Questions 4

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Buy Now
Questions 5

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Buy Now
Questions 6

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Buy Now
Questions 7

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

Options:

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Buy Now
Questions 8

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Buy Now
Questions 9

Which term describes data elements that, when combined with other information, are used to single out an individual?

Options:

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Buy Now
Questions 10

Which role in cloud computing provides products or services that interact with the primary offering of a cloud service provider?

Options:

A.

Regulator

B.

Cloud service partner

C.

Customer

D.

Cloud service developer

Buy Now
Questions 11

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

Options:

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Buy Now
Questions 12

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Buy Now
Questions 13

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Buy Now
Questions 14

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Buy Now
Questions 15

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

Options:

A.

Conflicting regulations in different jurisdictions

B.

Collection and use of genetic information

C.

Data breach notification requirements

D.

Use of digital surveillance by multinational employers

Buy Now
Questions 16

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

Options:

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Buy Now
Questions 17

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

Options:

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Buy Now
Questions 18

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Buy Now
Questions 19

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

Options:

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Buy Now
Questions 20

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

Options:

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Buy Now
Questions 21

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 22

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

Options:

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Buy Now
Questions 23

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Buy Now
Questions 24

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Buy Now
Exam Name: WGU Managing Cloud Security (JY02)
Last Update: Oct 5, 2025
Questions: 80
Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$25.5  $84.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$30  $99.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$40.5  $134.99