Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which aspect of access management safeguards data by determining the user's rights to a certain resource?

Options:

A.

Provisioning


B.

Authorization


C.

Authentication


D.

Centralization


Expert Solution
Questions # 12:

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.

Jurisdiction of the cloud provider and users


B.

Level of encryption that the cloud solution provides


C.

Configuration details specified in the contract


D.

Penalties specified in the service level agreement


Expert Solution
Questions # 13:

Which service model requires the most consumer responsibility for security issues?

Options:

A.

Platform as a Service (PaaS)


B.

Software as a Service (SaaS)


C.

Database as a Service (DBaaS)


D.

Infrastructure as a Service (IaaS)


Expert Solution
Questions # 14:

What should be done to data during the create phase of the data life cycle before being uploaded to the cloud?

Options:

A.

Store


B.

Archive


C.

Share


D.

Encrypt


Expert Solution
Questions # 15:

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

Options:

A.

Cases


B.

Stories


C.

Cookies


D.

Notes


Expert Solution
Questions # 16:

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force


B.

Encryption


C.

Rainbow tables


D.

Denial of service


Expert Solution
Questions # 17:

Which characteristic could affect the audit process for a customer of a cloud service provider?

Options:

A.

Lack of physical access to the cloud infrastructure


B.

Utilization constraints on the bandwidth imposed by the cloud service vendor


C.

Limits for up-time of the hosted system


D.

Restrictions on the data storage options offered by the cloud service provider


Expert Solution
Questions # 18:

Which legal framework is concerned with the privacy of data of EU/EEA citizens?

Options:

A.

HIPAA


B.

GDPR


C.

COPPA


D.

APPI


Expert Solution
Questions # 19:

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.

Encryption


B.

Gateway


C.

Sandbox


D.

Controller


Expert Solution
Questions # 20:

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

Options:

A.

One-way hashing


B.

Degaussing


C.

Overwriting


D.

Cryptographic erasure


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions