Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Questions 4

In which cloud service model is the cloud consumer responsible for installation and maintenance of the operating system?

Options:

A.

Network as a Service (NaaS)

B.

Platform as a Service (PaaS)

C.

Infrastructure as a Service (IaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 5

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

Options:

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols

Buy Now
Questions 6

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Buy Now
Questions 7

A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?

Options:

A.

Sniffed network ports

B.

Cloud service provider audit logs

C.

Host agent intrusion detection system

D.

Redundant network firewalls

Buy Now
Questions 8

Which phase of the cloud data life cycle involves the process of crypto-shredding?

Options:

A.

Destroy

B.

Create

C.

Archive

D.

Store

Buy Now
Questions 9

Which phase in secure application design and development includes threat modeling?

Options:

A.

Define

B.

Design

C.

Training

D.

Develop

Buy Now
Questions 10

Which phase of the cloud data lifecycle implements the file, block, or object type of cloud architecture?

Options:

A.

Archive

B.

Store

C.

Create

D.

Share

Buy Now
Questions 11

Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?

Options:

A.

Host-based firewall

B.

Database activity monitor

C.

Hardware security module

D.

Cloud access and security broker

Buy Now
Questions 12

Which cloud model allows an on-premises data center to use cloud bursting?

Options:

A.

Public

B.

Hybrid

C.

Community

D.

Private

Buy Now
Questions 13

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Buy Now
Questions 14

Which entity provides common directory services?

Options:

A.

Remote Authentication Dial-In User Service

B.

Terminal Access Controller Access-Control System

C.

Domain Name System

D.

Lightweight Directory Access Protocol

Buy Now
Questions 15

Which security issue can be found only through dynamic application security testing (DAST)?

Options:

A.

Code quality

B.

Null pointer dereference

C.

Insecure cryptographic function

D.

Runtime privileges

Buy Now
Questions 16

Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?

Options:

A.

Apache OpenStack

B.

Hypervisor

C.

VMware vSphere

D.

Open Web Application Security Project

Buy Now
Questions 17

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 18

Which security measure controls virtualization in the cloud?

Options:

A.

Monitoring and logging

B.

Using a dedicated hosting

C.

Managing image assets

D.

Securing the hypervisor

Buy Now
Questions 19

Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?

Options:

A.

Insurance

B.

Avoidance

C.

Mitigation

D.

Acceptance

Buy Now
Questions 20

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Buy Now
Questions 21

Which key cloud computing technology meters what is provided and ensures consumers only use what is allotted?

Options:

A.

Measured service

B.

Business impact analysis

C.

Subscription-based services

D.

Resource pooling

Buy Now
Questions 22

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

Options:

A.

Acceptance of liability for protection by the transferring entity

B.

Acknowledgement of liability for protection by the entity receiving the data transfer

C.

Demonstration of adequate level of protection similar to GDPR

D.

Formal consent of the data owner

Buy Now
Questions 23

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Buy Now
Questions 24

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Buy Now
Questions 25

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Buy Now
Questions 26

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

Options:

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Buy Now
Questions 27

Which term describes data elements that, when combined with other information, are used to single out an individual?

Options:

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Buy Now
Questions 28

Which U.S. standard is used by federal government agencies to manage enterprise risk?

Options:

A.

International Organization for Standardization (ISO) 37500

B.

The Statement on Standards for Attestation Engagements 18 (SSAE 18)

C.

The Committee of Sponsoring Organizations (COSO) framework

D.

The National Institute of Standards and Technology (NIST) SP 800-37

Buy Now
Questions 29

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 30

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Buy Now
Questions 31

Which security issue may occur when application programming interfaces (APIs) without sufficient validation are used in cloud services?

Options:

A.

Inefficient bandwidth utilization

B.

Perimeter security breach

C.

Data breach

D.

Crypto-shredding

Buy Now
Questions 32

Which means of access management is used to determine whether someone is a legitimate user?

Options:

A.

Authentication

B.

Authorization

C.

Federation

D.

Policy management

Buy Now
Questions 33

In most redundant array of independent disks (RAID) configurations, data is stored across different disks. Which method of storing data is described?

Options:

A.

Striping

B.

Archiving

C.

Mapping

D.

Crypto-shredding

Buy Now
Questions 34

Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?

Options:

A.

Object-based

B.

Volume

C.

Relational database

D.

File

Buy Now
Questions 35

Which logical consideration should be addressed when planning the design of a data center?

Options:

A.

Multitenancy of networks

B.

Heating and cooling

C.

Ability for expansion

D.

Utility power availability

Buy Now
Questions 36

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Buy Now
Questions 37

Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?

Options:

A.

Store

B.

Use

C.

Destroy

D.

Create

Buy Now
Questions 38

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Buy Now
Questions 39

Which type of service allows an organization to maximize control of its information?

Options:

A.

Infrastructure as a Service (IaaS)

B.

Platform as a Service (PaaS)

C.

Desktop as a Service (DaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 40

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

Options:

A.

Recovery time objective

B.

Data protection requirements

C.

SLA penalties

D.

Suspension of service clause

Buy Now
Questions 41

Which countermeasure should be taken during the preparation phase of the incident response lifecycle?

Options:

A.

Take the system offline

B.

Perform risk assessments

C.

Estimate the scope of the incident

D.

Build a timeline of attack

Buy Now
Questions 42

What is the definition of transportable as it relates to cloud contract design requirements?

Options:

A.

Available to be accessed by mobile devices

B.

Able to be moved to another vendor

C.

Available in a proprietary format

D.

Able to be archived quickly

Buy Now
Questions 43

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

Options:

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Buy Now
Questions 44

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

Options:

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization

Buy Now
Questions 45

Which security testing method requires compliance with the cloud service provider’s terms of service?

Options:

A.

Vulnerability assessment

B.

Continuous delivery pipeline

C.

Static analysis

D.

Code review

Buy Now
Questions 46

Which action should be taken to preserve forensic evidence for collection?

Options:

A.

Implementing serverless architectures

B.

Enabling threat modeling

C.

Pausing the virtual machine

D.

Enforcing mutable servers

Buy Now
Questions 47

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

Options:

A.

Measured service

B.

Resource pooling

C.

On-demand self-service

D.

Rapid elasticity

Buy Now
Questions 48

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

Options:

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

Buy Now
Questions 49

Which business continuity and disaster recovery consideration should be part of a cloud application architecture?

Options:

A.

Architecting for failure

B.

Health status pages

C.

Compliance of applications

D.

Application message queues

Buy Now
Questions 50

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Buy Now
Questions 51

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

Options:

A.

Testing

B.

Training

C.

Planning

D.

Coding

Buy Now
Questions 52

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Buy Now
Questions 53

Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?

Options:

A.

Extensible markup language (XML) gateway

B.

Web application firewall (WAF)

C.

Network-based database activity monitor (NDAM)

D.

Agent-based database activity monitor (ADAM)

Buy Now
Questions 54

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

Options:

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Buy Now
Questions 55

Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?

Options:

A.

Stark Law

B.

Healthcare Quality Improvement Law

C.

Health Insurance Portability and Accountability Act

D.

Gramm-Leach-Bliley Act

Buy Now
Questions 56

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

Options:

A.

Continuous monitoring

B.

Confidential computing

C.

Regulatory oversight

D.

Incident management

Buy Now
Questions 57

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

Options:

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Buy Now
Questions 58

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Buy Now
Questions 59

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.

It should ensure it has the correct type of license.

B.

It should ensure it has the correct location to store licenses.

C.

It should ensure it only uses closed-source licenses.

D.

It should ensure it only uses open-source licenses.

Buy Now
Questions 60

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

Options:

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

Buy Now
Questions 61

Which item determines whether a server has the capacity and the instance allocation to meet a customer’s requirements?

Options:

A.

Cloud provider

B.

Instance provider

C.

Cloud controller

D.

UniFi controller

Buy Now
Exam Name: WGU Managing Cloud Security (JY02, GZO1)
Last Update: Feb 21, 2026
Questions: 204
Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$25.5  $84.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$30  $99.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$40.5  $134.99