Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which action should be taken to ensure that unencrypted network traffic is protected?

Options:

A.

Data should be transmitted using the secure socket layer (SSL) protocol.


B.

Data should be transmitted after it is compressed and password protected using gunzip (GZ).


C.

Data should be transmitted using generic routing encapsulation (GRE).


D.

Data should be transmitted using the transport layer security (TLS) protocol.


Expert Solution
Questions # 2:

Which countermeasure should be taken during the preparation phase of the incident response lifecycle?

Options:

A.

Take the system offline


B.

Perform risk assessments


C.

Estimate the scope of the incident


D.

Build a timeline of attack


Expert Solution
Questions # 3:

What is at risk in the cloud environment when the management console is breached?

Options:

A.

Breakout of a guest OS that can access other hypervisors


B.

Amount of content on the image store


C.

Entire infrastructure that the control plane administers


D.

Sensitive information that images and snapshots can contain


Expert Solution
Questions # 4:

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

Options:

A.

Measured service


B.

Resource pooling


C.

On-demand self-service


D.

Rapid elasticity


Expert Solution
Questions # 5:

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

Options:

A.

Acceptance of liability for protection by the transferring entity


B.

Acknowledgement of liability for protection by the entity receiving the data transfer


C.

Demonstration of adequate level of protection similar to GDPR


D.

Formal consent of the data owner


Expert Solution
Questions # 6:

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration


B.

Dynamic policy control


C.

Persistent protection


D.

Continuous auditing


Expert Solution
Questions # 7:

An engineer has been given the task of ensuring all of the keys used to encrypt archival data are securely stored according to industry standards. Which location is a secure option for the engineer to store encryption keys for decrypting data?

Options:

A.

A repository that is made private


B.

An escrow that is kept separate from the data it is tied to


C.

An escrow that is kept local to the data it is tied to


D.

A repository that is made public


Expert Solution
Questions # 8:

Which description accurately characterizes the movement of applications to the cloud?

Options:

A.

In a desktop as a service (DaaS) environment, the customer is responsible for securing the underlying infrastructure.


B.

In an infrastructure as a service (IaaS) environment, the CSP is responsible for securing the platform.


C.

In a platform as a service (PaaS) environment, the customer is responsible for securing the underlying infrastructure.


D.

In a software as a service (SaaS) environment, the CSP is responsible for securing the platform.


Expert Solution
Questions # 9:

Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?

Options:

A.

Extensible markup language (XML) gateway


B.

Web application firewall (WAF)


C.

Network-based database activity monitor (NDAM)


D.

Agent-based database activity monitor (ADAM)


Expert Solution
Questions # 10:

Which security strategy is associated with data rights management solutions?

Options:

A.

Persistent protection


B.

Multilevel aggregation


C.

Enhanced detail


D.

Unexpired digital content


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions