100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OBJECTIVE ASSESSMENT / WGU C838 OA PREPARATION/WGU C838 OA PRACTICE WITH COMPLETE 100 QUESTIONS AND ANSWERS LATEST |A+ GRADE ASSURED

Rating
5.0
(2)
Sold
-
Pages
81
Grade
A+
Uploaded on
24-09-2025
Written in
2025/2026

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OBJECTIVE ASSESSMENT / WGU C838 OA PREPARATION/WGU C838 OA PRACTICE WITH COMPLETE 100 QUESTIONS AND ANSWERS LATEST |A+ GRADE ASSURED

Institution
WGU C838 MANAGING CLOUD SECURITY
Course
WGU C838 MANAGING CLOUD SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C838 MANAGING CLOUD SECURITY
Course
WGU C838 MANAGING CLOUD SECURITY

Document information

Uploaded on
September 24, 2025
Number of pages
81
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM
OBJECTIVE ASSESSMENT / WGU C838 OA
PREPARATION/WGU C838 OA PRACTICE WITH COMPLETE
100 QUESTIONS AND ANSWERS LATEST |A+ GRADE
ASSURED

Question 1
Which of the following cloud service models gives the customer the most
control over the underlying infrastructure?
A) Software as a Service (SaaS)
B) Platform as a Service (PaaS)
C) Infrastructure as a Service (IaaS)
D) Function as a Service (FaaS)
E) Security as a Service (SecaaS)
Correct Answer: C) Infrastructure as a Service (IaaS)
Rationale: In IaaS, the cloud provider manages the virtualization,
servers, storage, and networking, but the customer retains
significant control over operating systems, applications, data, and
some network components.

Question 2
According to the Cloud Security Alliance (CSA), which security domain
addresses the legal and contractual agreements between the cloud provider
and the customer?
A) Information Governance
B) Legal and Contracts
C) Risk Management
D) Data Sovereignty
E) Compliance
Correct Answer: B) Legal and Contracts
Rationale: The CSA Star program and its domains, such as the CSA
CCM, specifically identify "Legal and Contracts" as a domain focused
on the legal aspects and agreements governing cloud services.

Question 3
What is the primary characteristic of a "Shared Responsibility Model" in cloud
security?
A) The cloud provider is solely responsible for all security.
B) The customer is solely responsible for all security.
C) Security responsibilities are divided between the cloud provider
and the cloud customer.
D) Security responsibilities are handled by a third-party auditor.
E) Security is not a concern in the cloud.

,Correct Answer: C) Security responsibilities are divided between the
cloud provider and the cloud customer.
Rationale: The shared responsibility model defines which security
tasks the cloud provider is responsible for and which the customer
is responsible for, depending on the service model (IaaS, PaaS,
SaaS).

Question 4
Which of the following is a common security concern unique to a public cloud
environment compared to an on-premises data center?
A) Physical security of servers.
B) Network firewalls.
C) Data sovereignty and compliance across multiple geographic
regions.
D) Endpoint protection.
E) Access control for internal users.
Correct Answer: C) Data sovereignty and compliance across multiple
geographic regions.
Rationale: In a public cloud, data can be stored in various
geographic locations, raising complex issues regarding which
country's laws apply to the data (data sovereignty) and how to
maintain compliance with diverse regulations.

Question 5
What is "Cloud Access Security Broker" (CASB) primarily used for?
A) To encrypt data stored in the cloud.
B) To provide a secure VPN connection to the cloud.
C) To enforce security policies between cloud consumers and cloud
providers.
D) To manage identity and access within the cloud.
E) To monitor network traffic within a single cloud provider.
Correct Answer: C) To enforce security policies between cloud
consumers and cloud providers.
Rationale: CASBs act as intermediaries between cloud users and
cloud applications, extending on-premises security policies to the
cloud, providing visibility, data security, threat protection, and
compliance assurance.

Question 6
Which aspect of cloud security focuses on ensuring that data is accurate,
complete, and protected from unauthorized modification?

,A) Confidentiality
B) Integrity
C) Availability
D) Non-repudiation
E) Resiliency
Correct Answer: B) Integrity
Rationale: Data integrity ensures that data has not been altered or
destroyed in an unauthorized manner, maintaining its accuracy and
trustworthiness.

Question 7
A cloud customer is migrating a legacy application to an IaaS environment.
Who is primarily responsible for patching the operating system of the virtual
machines?
A) The cloud provider.
B) A third-party security vendor.
C) The cloud customer.
D) An automated patching service managed by the provider.
E) It is not required in IaaS.
Correct Answer: C) The cloud customer.
Rationale: In the IaaS model, the cloud customer is responsible for
the guest operating system, including patching, configuration, and
security of applications running on top of it.

Question 8
Which threat involves an attacker sending deceptive emails or messages
that appear to be from a legitimate source to trick cloud users into revealing
sensitive information?
A) Malware
B) Phishing
C) Denial of Service (DoS)
D) Insider threat
E) Cloud jacking
Correct Answer: B) Phishing
Rationale: Phishing attacks are a common social engineering
technique used to compromise cloud credentials by tricking users
into providing sensitive information through fraudulent
communications.

Question 9
What is the primary benefit of using Identity and Access Management (IAM)

, solutions in the cloud?
A) To encrypt all data in transit.
B) To manage network firewalls.
C) To securely manage and control who can access specific cloud
resources and what actions they can perform.
D) To detect and prevent DDoS attacks.
E) To provide physical security for cloud data centers.
Correct Answer: C) To securely manage and control who can access
specific cloud resources and what actions they can perform.
Rationale: IAM is fundamental to cloud security, providing the
framework to define and enforce access policies, authenticate
users, and authorize their actions on cloud resources.

Question 10
Which type of cloud deployment model is characterized by resources being
exclusively operated by a single organization?
A) Public cloud
B) Private cloud
C) Hybrid cloud
D) Community cloud
E) Multi-cloud
Correct Answer: B) Private cloud
Rationale: A private cloud is cloud infrastructure operated solely for
a single organization, whether managed internally or by a third
party, and can be on-premises or off-premises.

Question 11
What does "Data Sovereignty" refer to in cloud computing?
A) The ability to move data between different cloud providers.
B) The customer's ownership of their data.
C) The legal jurisdiction (laws) that applies to data based on its
physical location.
D) The encryption of data at rest.
E) The right to access your own data.
Correct Answer: C) The legal jurisdiction (laws) that applies to data
based on its physical location.
Rationale: Data sovereignty is a critical concern in cloud computing,
as the physical location of data determines which country's laws and
regulations (e.g., privacy, data retention) apply to it.

Reviews from verified buyers

Showing all 2 reviews
2 months ago

2 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
POLYCARP West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
814
Member since
9 months
Number of followers
11
Documents
828
Last sold
4 hours ago
The scholars desk

Struggling to find high-quality study materials? Look no further! I offer well-structured notes, summaries, essays, and research papers across various subjects, designed to help you understand concepts faster, improve your grades, and save study time What You’ll Find Here: ✔ Clear, concise, and exam-focused study materials ✔ Well-organized content for easy understanding ✔ Reliable resources to support your assignments and research ✔ Time-saving summaries to help you study efficiently Whether you\'re preparing for an exam, working on an assignment, or just need a quick reference, my materials are crafted to provide accurate, well-researched, and easy-to-grasp information Browse through my collection and take your studies to the next level!

Read more Read less
4.9

443 reviews

5
394
4
41
3
4
2
1
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions