STUDY GUIDE WITH 150 PRACTICE QUESTIONS AND VERIFIED
ANSWERS FOR OA EXAM PREP WITH MOST TESTED QUESTIONS//
GRADED A+
WGU C838 – MANAGING CLOUD SECURITY FOCUSES ON STRATEGIES TO SECURE CLOUD
ENVIRONMENTS, INCLUDING ARCHITECTURAL CONTROLS, DATA ENCRYPTION, IDENTITY
AND ACCESS MANAGEMENT (IAM), AND INCIDENT RESPONSE. THIS RESOURCE IS DESIGNED
TO PREPARE STUDENTS FOR THE OBJECTIVE ASSESSMENT (OA) WITH PRACTICE QUESTIONS,
EXPLANATIONS, AND KEY CONCEPT REVIEWS. IDEAL FOR CYBERSECURITY STUDENTS
PURSUING CLOUD SECURITY CERTIFICATION IN 2025.
Which phase of the cloud data lifecycle allows both read and process functions to be performed?
Share
Store
Create
Archive - CORRECT ANSWER-Create
Which phase of the cloud data security lifecycle typically occurs simultaneously with creation?
Use
Share
Store
Destroy - CORRECT ANSWER-Store
Which data retention solution should be applied to a file in order to reduce the data footprint by
deleting fixed content and duplicate data?
Saving
Backup
Caching
Archiving - CORRECT ANSWER-Archiving
Which data retention method is stored with a minimal amount of metadata storage with the
content?
,File system
Redundant array
Block-based
Object-based - CORRECT ANSWER-Block-based
What is a key capability of security information and event management?
Secure remote access
Intrusion prevention capabilities
Automatic remediation of issues
Centralized collection of log data - CORRECT ANSWER-Centralized collection of log data
Which data source provides auditability and traceability for event investigation as well as
documentation?
Storage files
Packet capture
Database tables
Network interference - CORRECT ANSWER-Packet capture
Which data source provides auditability and traceability for event investigation as well as
documentation?
Database schema
Ephemeral storage
Network segmentation
Virtualization platform logs - CORRECT ANSWER-Virtualization platform logs
Which technology is used to manage identity access management by building trust relationships
between organizations?
Federation
Single sign-on
Biometric authentication
Multifactor authentication - CORRECT ANSWER-Federation
, Which term describes the action of confirming identity access to an information system?
Access
Concept
Coordination
Authentication - CORRECT ANSWER-Authentication
Which cloud computing tool is used to discover internal use of cloud services using various
mechanisms such as network monitoring?
Data loss prevention (DLP)
Web application firewall (WAF)
Content delivery network (CDN)
Cloud access security broker (CASB) - CORRECT ANSWER-Cloud access security broker (CASB)
Which cloud computing technology unlocks business value through digital and physical access to
maps?
Multitenancy
Cloud application
On-demand self-service
Application programming interface - CORRECT ANSWER-Application programming interface
Which cloud computing tool may help detect data migrations to cloud services?
Cloud data transfer
Data loss prevention
Cloud security gateways
Uniform resource locator (URL) filtering - CORRECT ANSWER-Data loss prevention
What is a key component of the infrastructure as a service (IaaS) cloud service model?
High reliability and resilience
Allows choice and reduces lock-in
Ease of use and limited administration
Supports multiple languages and frameworks - CORRECT ANSWER-High reliability and resilience