Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?

Options:

A.

Host-based firewall


B.

Database activity monitor


C.

Hardware security module


D.

Cloud access and security broker


Expert Solution
Questions # 22:

Which item should be used by a consumer to determine whether a cloud service provider is in regulatory or legal compliance?

Options:

A.

Warrant


B.

Third-party attestation


C.

Regulatory obligations


D.

Existing contract


Expert Solution
Questions # 23:

Which security issue can be found only through dynamic application security testing (DAST)?

Options:

A.

Code quality


B.

Null pointer dereference


C.

Insecure cryptographic function


D.

Runtime privileges


Expert Solution
Questions # 24:

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration


B.

Baseline


C.

Pipeline


D.

Framework


Expert Solution
Questions # 25:

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing


B.

Denial of service


C.

Tampering


D.

Elevation of privilege


Expert Solution
Questions # 26:

Which type of service allows an organization to maximize control of its information?

Options:

A.

Infrastructure as a Service (IaaS)


B.

Platform as a Service (PaaS)


C.

Desktop as a Service (DaaS)


D.

Software as a Service (SaaS)


Expert Solution
Questions # 27:

A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?

Options:

A.

Sniffed network ports


B.

Cloud service provider audit logs


C.

Host agent intrusion detection system


D.

Redundant network firewalls


Expert Solution
Questions # 28:

Which description characterizes the application programming interface (API) format known as Simple Object Access Protocol (SOAP)?

Options:

A.

Consists of guidelines and best practices for creating scalable web services


B.

Provides a framework for exchanging structured information using web services


C.

Delivers good performance and scalability


D.

Supports different data formats such as JSON, XML, and YAML


Expert Solution
Questions # 29:

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

Options:

A.

Long-running VMs that still run standard security controls may be isolated on the network.


B.

They are locked down more than the usual servers and tend to run a smaller set of services.


C.

The traditional tools are not normally designed for that degree of velocity.


D.

Some agents require opening additional firewall ports, which increases the network attack surface.


Expert Solution
Questions # 30:

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation


B.

Physical destruction


C.

Overwriting


D.

Degaussing


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions