Spring Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Managing-Cloud-Security WGU Managing Cloud Security (JY02, GZO1) Questions and Answers

Questions 4

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Buy Now
Questions 5

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.

Hardware security module (HSM)

B.

Zero trust

C.

Bastion host

D.

Identity provider (IdP)

Buy Now
Questions 6

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

Options:

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Buy Now
Questions 7

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Buy Now
Questions 8

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Buy Now
Questions 9

A breach caused by lack of security management resulted in a civil lawsuit. The organization must communicate with the entity that is responsible for performing adequate oversight. Who should be contacted?

Options:

A.

Cloud customer

B.

IT department

C.

High-level government agencies

D.

Board of director members

Buy Now
Questions 10

Which general body of law covers data breach violations in a cloud environment at a federal agency?

Options:

A.

Criminal

B.

Civil

C.

Administrative

D.

Tort

Buy Now
Questions 11

Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?

Options:

A.

IDEA

B.

DMCA

C.

FERPA

D.

GLBA

Buy Now
Questions 12

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Buy Now
Questions 13

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Buy Now
Questions 14

Which cloud computing role can subscribe to a software as a service (SaaS) application?

Options:

A.

Cloud service customer

B.

Cloud computing

C.

Cloud service provider

D.

Cloud application

Buy Now
Questions 15

Which design component contains both a remotely accessible application programming interface (API) and a web graphical user interface?

Options:

A.

Infrastructure

B.

Management

C.

Applistructure

D.

Metastructure

Buy Now
Questions 16

Which type of service allows an organization to maximize control of its information?

Options:

A.

Infrastructure as a Service (IaaS)

B.

Platform as a Service (PaaS)

C.

Desktop as a Service (DaaS)

D.

Software as a Service (SaaS)

Buy Now
Questions 17

Which key management option typically needs to be on-premises and delivers the keys to the cloud over a dedicated connection?

Options:

A.

Hardware security appliance

B.

Hybrid

C.

Virtual appliance

D.

Cloud provider service

Buy Now
Questions 18

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML

B.

Database

C.

Object-based

D.

Volume

Buy Now
Questions 19

An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?

Options:

A.

The results of the organization's most recent privacy audit

B.

A notice of any contractual obligations that do not align with the privacy policy

C.

A copy of federal privacy laws regarding unauthorized data disclosure

D.

The organization's privacy policy and handling practices

Buy Now
Questions 20

Which characteristic could affect the audit process for a customer of a cloud service provider?

Options:

A.

Lack of physical access to the cloud infrastructure

B.

Utilization constraints on the bandwidth imposed by the cloud service vendor

C.

Limits for up-time of the hosted system

D.

Restrictions on the data storage options offered by the cloud service provider

Buy Now
Questions 21

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Buy Now
Questions 22

Which risk relates to the removal of a person’s information within the public cloud by legal authorities?

Options:

A.

Remote wiping

B.

Vendor lock-in

C.

Data masking

D.

Data seizure

Buy Now
Questions 23

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Buy Now
Questions 24

Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?

Options:

A.

Apache OpenStack

B.

Hypervisor

C.

VMware vSphere

D.

Open Web Application Security Project

Buy Now
Questions 25

Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?

Options:

A.

Stark Law

B.

Healthcare Quality Improvement Law

C.

Health Insurance Portability and Accountability Act

D.

Gramm-Leach-Bliley Act

Buy Now
Questions 26

Which action should be taken to preserve forensic evidence for collection?

Options:

A.

Implementing serverless architectures

B.

Enabling threat modeling

C.

Pausing the virtual machine

D.

Enforcing mutable servers

Buy Now
Questions 27

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 28

Which cloud infrastructure risk is the responsibility of the cloud provider?

Options:

A.

Physical security

B.

Data security

C.

Application security

D.

Security governance

Buy Now
Questions 29

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Buy Now
Questions 30

What must be provided by a European Union (EU) citizen, according to the General Data Protection Regulation (GDPR), before a firm may process the personal data of that individual?

Options:

A.

Specific consent for the processing of the data

B.

Attestation on the legal purpose for processing the data

C.

Verification of the accuracy of the data

D.

Statement about need for the data to be processed

Buy Now
Questions 31

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Buy Now
Questions 32

Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?

Options:

A.

Extensible markup language (XML) gateway

B.

Web application firewall (WAF)

C.

Network-based database activity monitor (NDAM)

D.

Agent-based database activity monitor (ADAM)

Buy Now
Questions 33

What is a benefit of federated identity and access management (IAM)?

Options:

A.

Use of U.S. federal government identities

B.

Segregation of duties

C.

Disablement of CSP

D.

Use of an organization’s identities

Buy Now
Questions 34

Which security testing method requires compliance with the cloud service provider’s terms of service?

Options:

A.

Vulnerability assessment

B.

Continuous delivery pipeline

C.

Static analysis

D.

Code review

Buy Now
Questions 35

Which phase of the cloud secure data lifecycle is being viewed and processed without modification?

Options:

A.

Store

B.

Create

C.

Use

D.

Share

Buy Now
Questions 36

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

Options:

A.

Virtual client

B.

Secure Shell

C.

Bastion host

D.

Host isolation

Buy Now
Questions 37

Which countermeasure should be taken during the preparation phase of the incident response lifecycle?

Options:

A.

Take the system offline

B.

Perform risk assessments

C.

Estimate the scope of the incident

D.

Build a timeline of attack

Buy Now
Questions 38

Which security issue can be found only through dynamic application security testing (DAST)?

Options:

A.

Code quality

B.

Null pointer dereference

C.

Insecure cryptographic function

D.

Runtime privileges

Buy Now
Questions 39

Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?

Options:

A.

Quality of Service (QoS)

B.

Distributed Denial of Service (DDoS)

C.

Intrusion Detection System (IDS)

D.

Runtime Application Self-Protection (RASP)

Buy Now
Questions 40

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Buy Now
Questions 41

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

Options:

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Buy Now
Questions 42

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 43

Which cost is reduced by using software as a service (SaaS)?

Options:

A.

General costs of licensing

B.

Ongoing costs by utilizing a single vendor

C.

Energy costs with optimum use of IT resources

D.

Support costs for hardware and software

Buy Now
Questions 44

Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?

Options:

A.

Transport Layer Security (TLS)

B.

Domain Name System (DNS)

C.

Clustered hosting

D.

Resource sharing

Buy Now
Questions 45

What is the definition of transportable as it relates to cloud contract design requirements?

Options:

A.

Available to be accessed by mobile devices

B.

Able to be moved to another vendor

C.

Available in a proprietary format

D.

Able to be archived quickly

Buy Now
Questions 46

A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?

Options:

A.

Data is sent to the tokenization server.

B.

The application generates a piece of sensitive data.

C.

The tokenization server returns the token to the application.

D.

The application stores the token rather than the original data.

Buy Now
Questions 47

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

Options:

A.

Long-running VMs that still run standard security controls may be isolated on the network.

B.

They are locked down more than the usual servers and tend to run a smaller set of services.

C.

The traditional tools are not normally designed for that degree of velocity.

D.

Some agents require opening additional firewall ports, which increases the network attack surface.

Buy Now
Questions 48

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Buy Now
Questions 49

Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?

Options:

A.

Cloud user

B.

Data controller

C.

Cloud provider

D.

Data subject

Buy Now
Questions 50

Which guide remedies the challenge of the international nature of cloud forensics and is known for becoming the premier standard for eDiscovery?

Options:

A.

ISO/IEC 27042:2015

B.

ISO/IEC 27041:2015

C.

ISO/IEC 27050-1:2016

D.

ISO/IEC 27037:2012

Buy Now
Questions 51

Which cloud storage design is based on a hierarchical system?

Options:

A.

Database

B.

Block

C.

File

D.

Object

Buy Now
Questions 52

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

Options:

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Buy Now
Questions 53

Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?

Options:

A.

Tabletop

B.

Dry run

C.

Parallel

D.

Full

Buy Now
Questions 54

Which type of cloud security vulnerability is static application security testing (SAST) likely to find?

Options:

A.

Software misconfiguration

B.

Embedded credentials

C.

Hypervisor vulnerabilities

D.

Run-time vulnerabilities

Buy Now
Questions 55

Which key cloud computing technology meters what is provided and ensures consumers only use what is allotted?

Options:

A.

Measured service

B.

Business impact analysis

C.

Subscription-based services

D.

Resource pooling

Buy Now
Questions 56

Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?

Options:

A.

Sandboxing

B.

Threat modeling

C.

Application virtualization

D.

Multitenancy

Buy Now
Questions 57

The designers of a proposed data center are evaluating the requirements to use virtualization for the services it provides. Which type of design consideration is being addressed?

Options:

A.

Logical

B.

Regulatory

C.

Environmental

D.

Physical

Buy Now
Questions 58

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Buy Now
Questions 59

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

Options:

A.

Testing

B.

Training

C.

Planning

D.

Coding

Buy Now
Questions 60

An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?

Options:

A.

Individual users’ private keys

B.

The organization's certificate repository server

C.

The organization's certificate authority server

D.

Individual systems' private keys

Buy Now
Questions 61

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.

It should ensure it has the correct type of license.

B.

It should ensure it has the correct location to store licenses.

C.

It should ensure it only uses closed-source licenses.

D.

It should ensure it only uses open-source licenses.

Buy Now
Exam Name: WGU Managing Cloud Security (JY02, GZO1)
Last Update: Feb 19, 2026
Questions: 204
Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$25.5  $84.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$30  $99.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$40.5  $134.99