New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

Options:

A.

Virtual client


B.

Secure Shell


C.

Bastion host


D.

Host isolation


Expert Solution
Questions # 2:

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation


B.

Physical destruction


C.

Overwriting


D.

Degaussing


Expert Solution
Questions # 3:

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

Options:

A.

Performance efficiency


B.

Operational excellence


C.

Reliability


D.

Sustainability


Expert Solution
Questions # 4:

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.

Privacy control


B.

Protection levels


C.

Risk acceptance


D.

Compensating control


Expert Solution
Questions # 5:

Which type of storage includes categories such as relational, nonrelational, key-value, and document-oriented?

Options:

A.

XML


B.

Database


C.

Object-based


D.

Volume


Expert Solution
Questions # 6:

Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?

Options:

A.

Store


B.

Use


C.

Destroy


D.

Create


Expert Solution
Questions # 7:

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)


B.

Platform as a service (PaaS)


C.

Software as a service (SaaS)


D.

Infrastructure as a service (IaaS)


Expert Solution
Questions # 8:

When should a cloud service provider delete customer data?

Options:

A.

When the cloud provider oversubscribes its storage space


B.

When the data has not been accessed in the last 30 days


C.

After a scheduled data review


D.

After the specified retention period


Expert Solution
Questions # 9:

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining


B.

Patch management


C.

Deployment


D.

Capacity management


Expert Solution
Questions # 10:

An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?

Options:

A.

Individual users’ private keys


B.

The organization's certificate repository server


C.

The organization's certificate authority server


D.

Individual systems' private keys


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions