Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

Managing-Cloud-Security WGU Managing Cloud Security (JY02) Questions and Answers

Questions 4

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Buy Now
Questions 5

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.

Firewall

B.

Virtual display

C.

Network

D.

Load balancer

Buy Now
Questions 6

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

Options:

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Buy Now
Questions 7

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

Options:

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 8

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Buy Now
Questions 9

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Buy Now
Questions 10

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Buy Now
Questions 11

Which activity is within the scope of the cloud provider’s role in the chain of custody?

Options:

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Buy Now
Questions 12

Which term describes data elements that, when combined with other information, are used to single out an individual?

Options:

A.

Direct identifiers

B.

Data subjects

C.

Personal details

D.

Indirect identifiers

Buy Now
Questions 13

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Buy Now
Questions 14

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Buy Now
Questions 15

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

Options:

A.

A repository that is made private

B.

An escrow that is kept separate from the data it is tied to

C.

An escrow that is kept local to the data it is tied to

D.

A repository that is made public

Buy Now
Questions 16

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 17

An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?

Options:

A.

Verifying the details of the contract and arrangements for data transfer

B.

Ensuring the vendor has securely destroyed all confidential information

C.

Identifying the business need the vendor will address

D.

Deciding how to respond to the request for proposal (RFP)

Buy Now
Questions 18

What is the process of identifying and procuring stored data as evidence for legal purposes?

Options:

A.

Chain of custody

B.

Forensic imaging

C.

Electronic discovery

D.

Gap analysis

Buy Now
Questions 19

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Buy Now
Questions 20

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Buy Now
Questions 21

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

Options:

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Buy Now
Questions 22

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Buy Now
Questions 23

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Buy Now
Questions 24

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

Options:

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Buy Now
Exam Name: WGU Managing Cloud Security (JY02)
Last Update: Oct 5, 2025
Questions: 80
Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$25.5  $84.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$30  $99.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$40.5  $134.99