100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST 2023-24 |AGRADE

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
03-04-2024
Written in
2023/2024

You are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to comply with the existing legislative and contractual frameworks your organization is required to follow. This is a _________ issue. a. Resiliency b. Privacy c. Performance d. Regulatory D 76. You are the security subject matter expert (SME) for an organization considering a transition from the legacy environ ment into a hosted cloud provider 's data center. One of the challenges you 're facing is whether the cloud provider will be able to allow your organization to substantiate and determine with some assurance that all of the contract terms are being met. This is a(n) ____________ issue. a. Regulatory b. Privacy c. Resiliency d. Auditability D 77. Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why might that not be the optimum choice for an organization? a. K ey length variances don 't provide any actual additional security. b. It would cause additional processing overhead and time delay. c. It might result in vendor lockout. d. The data subjects might be upset by this.

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
April 3, 2024
Number of pages
10
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND
ANSWERS LATEST 2023-2024 |AGRADE

You are the security subject matter expert (SME) for an organization considering a transition from the legacy environment into a hosted cloud provider 's data center. One of the challenges you
're facing is whether the cloud provider will be able to comply with the existing legislative and contractual frameworks your organization is required to follow. This is a _________ issue.

a. Resiliency
b. Privacy
c. Performance
d. Regulatory
D
76. You are the security subject matter expert (SME) for an organization considering a transition from the legacy environ ment into a hosted cloud provider 's data center. One of the challenges
you 're facing is whether the cloud provider will be able to allow your organization to substantiate and determine with some assurance that all of the contract terms are being met. This is a(n)
____________ issue.
a. Regulatory
b. Privacy
c. Resiliency
d. Auditability
D
77. Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why
might that not be the optimum choice for an organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.
c. It might result in vendor lockout.
d. The data subjects might be upset by this.
B
78. Encryption is an essential tool for affording security to cloud-based operations. While it is possible to encrypt every system, piece of data, and transaction that takes place on the cloud, why
might that not be the optimum choice for an organization?
a. It could increase the possibility of physical theft.
b. Encryption won 't work throughout the environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within the organization.
C
79. Which of the following is not an element of the identification component of identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisioning
C
80. Which of the following entities is most likely to play a vital role in the identity provisioning aspect of a user 's experience in an organization?
a. The accounting department
b. The human resources (HR) office
c. The maintenance team
d. The purchasing office
B
81. Why is the deprovisioning element of the identification component of identity and access management (IAM) so important?
a. Extra accounts cost so much extra money.
b. Open but unassigned accounts are vulnerabilities.
c. User tracking is essential to performance.
d. Encryption has to be maintained.
B
82. All of the following are reasons to perform review and maintenance actions on user accounts except ____________.
a. To determine whether the user still needs the same access
b. To determine whether the user is still with the organization
c. To determine whether the data set is still applicable to the user 's role
d. To determine whether the user is still performing well
D
83. Who should be involved in review and maintenance of user accounts/access?
a. The user 's manager
b. The security manager
c. The accounting department
d. The incident response team
A
84. Which of the following protocols is most applicable to the identification process aspect of identity and access management (IAM)?
a. Secure Sockets Layer (SSL)
b. Internet Protocol security (IPsec)
c. Lightweight Directory Access Protocol (LDAP)
d. Amorphous ancillary data transmission (AADT)
C
85. Privileged user (administrators, managers, and so forth) accounts need to be reviewed more closely than basic user accounts. Why is this?
a. Privileged users have more encryption keys.
b. Regular users are more trustworthy.
c. There are extra controls on privileged user accounts.
d. Privileged users can cause more damage to the organization.
D
86. The additional review activities that might be performed for privileged user accounts could include all of the following except _____________.
a. Deeper personnel background checks
b. Review of personal financial accounts for privileged users
c. More frequent reviews of the necessity for access
d. Pat-down checks of privileged users to deter against physical theft
D
87. If personal financial account reviews are performed as an additional review control for privileged users, which of the following characteristics is least likely to be a useful indicator for review
purposes?
a. Too much money in the account
b. Too little money in the account
c. The bank branch being used by the privileged user
d. Specific senders/recipients
C
88. How often should the accounts of privileged users be reviewed?
a. Annually
b. Twice a year
c. Monthly
d. More often than regular user account reviews
D
89. Privileged user account access should be __________.
a. Temporary
b. Pervasive
c. Thorough
d. Granular
A

, WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND
ANSWERS LATEST 2023-2024 |AGRADE

90. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating in cloud computing. According to the CSA 's Notorious Nine list, data
breaches can be ____________.
a. Overt or covert
b. International or subterranean
c. From internal or external sources
d. Voluminous or specific
C
91. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating i n cloud computing. According to the CSA, an organization that
operates in the cloud environment and suffers a data breach may be required to __________.
a. Notify affected users
b. Reapply for cloud service
c. Scrub all affected physical memory
d. Change regulatory frameworks
A
92. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating in cloud computing. According to the CSA, an organization that
suffers a data breach might suffer all of the following negative effects except __________.
a. Cost of compliance with notification laws
b. Loss of public perception/goodwill
c. Loss of market share
d. Cost of detection
D
93. The Cloud Security Alliance (CSA) publishes, the Notorious Nine, a list of common threats to organizations participating in cloud computing. According to the CSA, in the event of a data
breach, a cloud customer will likely need to comply with all the following data breach notification requirements except ____________.
a. Multiple state laws
b. Contractual notification requirements
c. All standards-based notification schemes
d. Any applicable federal regulations
C
94. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating i n cloud computing. According to the CSA, data loss can be suffered
as a result of ____________ activity.
a. Malicious or inadvertent
b. Casual or explicit
c. Web-based or stand-alone
d. Managed or independent
A
95. The Cloud Security Alliance (CSA) publishes, the Notorious Nine, a list of common threats to organizations participating in cloud computing. According to the CSA, all of the following activity
can result in data loss except ____________.
a. Misplaced crypto keys
b. Improper policy
c. Ineffectual backup procedures
d. Accidental overwrite
B
96. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating i n cloud computing. According to the CSA, service traffic high jacking
can affect all of the following portions of the CIA triad except ___________.
a. Confidentiality
b. Integrity
c. Availability
d. None. Service traffic high jacking can 't affect any portion of the CIA triad.
D
97. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizatio ns participating in cloud computing. The CSA recommends the prohibition of
__________ in order to diminish the likelihood of account/service traffic high jacking.
a. All user activity
b. Sharing account credentials between users and services
c. Multifactor authentication
d. Interstate commerce
B
98. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating i n cloud computing. According to the CSA, which aspect of cloud
computing makes it particularly susceptible to account/service traffic high jacking?
a. Scalability
b. Metered service
c. Remote access
d. Pooled resources
C
99. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating i n cloud computing. According to the CSA, what is one reason the
threat of insecure interfaces and APIs is so prevalent in cloud computing?
a. Most of the cloud customer 's interaction with resources will be performed through APIs.
b. APIs are inherently insecure.
c. Attackers have already published vulnerabilities for all known APIs.
d. APIs are known carcinogens.
A/B
100. .The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to organizations participating in cloud computing. According to the CSA, what is one reason the
threat of insecure interfaces and APIs is so prevalent in cloud computing?
a. Cloud customers and third parties are continually enhancing and modifying APIs.
b. APIs can have automated settings.
c. It is impossible to uninstall APIs.
d. APIs are a form of malware.
A
75. Software developers should receive cloud-specific training that highlights the specific challenges involved with having a production environment that operates in the cloud. One of these
challenges is ____________.
a. Lack of management oversight
b. Additional workload in creating governance for two environments (the cloud data center and client devices)
c. Increased threat of malware
d. The need for process isolation
D
76. Which security technique is most preferable when creating a limited functionality for customer service personnel to review account data related to sales made to your clientele?
a. Anonymization
b. Masking
c. Encryption
d. Training
B
77. At which phase of the software development life cycle (SDLC) is user involvement most crucial?
a. Define
b. Design
c. Develop
d. Test
A
78. At which phase of the SDLC should security personnel first be involved?
a. Define
$26.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
THEEXCELLENCELIBRARY Harvard University
Follow You need to be logged in order to follow users or courses
Sold
17
Member since
2 year
Number of followers
6
Documents
2641
Last sold
1 month ago
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Read more Read less
2.5

2 reviews

5
0
4
0
3
1
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions