Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?

Options:

A.

Natural disasters


B.

Outages


C.

Fast run time


D.

Homomorphic encryption


Expert Solution
Questions # 42:

Which security testing method requires compliance with the cloud service provider’s terms of service?

Options:

A.

Vulnerability assessment


B.

Continuous delivery pipeline


C.

Static analysis


D.

Code review


Expert Solution
Questions # 43:

Which type of risk comes from outsourcing significant vendor-specific investments for data, procedures, or processes to a cloud provider?

Options:

A.

Compliance


B.

Lock-in


C.

Overutilization


D.

Exit


Expert Solution
Questions # 44:

Which security control could be implemented as part of a layered physical defense at a cloud hosting site?

Options:

A.

Access control enforcement


B.

Background checks


C.

Video surveillance capability


D.

Multifactor authentication


Expert Solution
Questions # 45:

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing


B.

Encryption


C.

Change tracking


D.

Metadata labeling


Expert Solution
Questions # 46:

Which data management activity is considered legal fair use of a copyrighted item?

Options:

A.

Reporting the work on the news


B.

Performing the work publicly


C.

Exporting the work


D.

Broadcasting the work


Expert Solution
Questions # 47:

Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?

Options:

A.

Risk transfer


B.

Vulnerability assessment


C.

Business impact analysis


D.

Out-of-band validation


Expert Solution
Questions # 48:

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks


B.

Social engineering


C.

Escalation of privilege


D.

Internal threats


Expert Solution
Questions # 49:

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.

Locks


B.

Cameras


C.

Bollards


D.

Fences


Expert Solution
Questions # 50:

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

Options:

A.

Data classification


B.

Hardware management


C.

Software procurement


D.

Acceptable use


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions