100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C838 – MANAGING CLOUD SECURITY EXAM QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
29-10-2025
Written in
2025/2026

WGU C838 – MANAGING CLOUD SECURITY EXAM QUESTIONS AND ANSWERS

Institution
WGU C838
Course
WGU C838











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C838
Course
WGU C838

Document information

Uploaded on
October 29, 2025
Number of pages
33
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • wgu c838

Content preview

WGU C838 – MANAGING CLOUD SECURITY
EXAM QUESTIONS AND ANSWERS
What are the 4 characteristics of cloud computing? - ANSWER-Broad network access
On-demand services
Resource Pooling
Measured or "metered" service

What NIST publication number defines cloud computing? - ANSWER-800-145

What ISO/IEC standard provides information on cloud computing? - ANSWER-17788

What is another way of describing a functional business requirement? - ANSWER-
necessary

What is another way of describing a nonfunctional business requirement? - ANSWER-
not necessary

What is the greatest driver pushing orgs to the cloud? - ANSWER-Cost savings

What is cloud bursting? - ANSWER-Ability to increase available cloud resources on
demand

What are 3 characteristics of cloud computing? - ANSWER-Elasticity
Simplicity
Scalability

What is a cloud customer? - ANSWER-Anyone purchasing cloud services

What is a cloud user? - ANSWER-Anyone using cloud services

What are the three cloud computing service models? - ANSWER-SaaS(Software as a
service)
PaaS(Platform as a service)
IaaS(Infrastructure as a service)

What is IaaS (Infrastructure as a Service)? - ANSWER-Cloud provider provides all the
physical capability and administration, while the customer is responsible for logical
resources.

What is PaaS (Platform as a Service)? - ANSWER-A cloud computing service that
provides the hardware and the operating system and is responsible for updating and
maintaining both.

,What is SaaS (Software As A Service)? - ANSWER-Cloud provider manages
everything.

What are the four cloud deployment models? - ANSWER-Public
Private
Community
Hybrid

What cloud model is owned by a single organization? - ANSWER-Private

What cloud model is an arrangement of two or more cloud servers? - ANSWER-Hybrid

What cloud model is a shared setup between orgs? - ANSWER-Community

What cloud model is open for free usage? - ANSWER-Public

What is a cloud service provider? - ANSWER-Cloud service provider manages and
provides entire hosting ability

What is a Cloud Access Security Broker? - ANSWER-Third-party acting as an
intermediary for identity and access management

What do regulators do? - ANSWER-Ensure organizations are in compliance with
regulatory framework.

What word in the CIA triad describes: What protects information from unauthorized
access/dissemination? - ANSWER-Confidentiality

What word in the CIA triad describes: Ensuring that information is not subject to
unauthorized modification? - ANSWER-Integrity

What word in the CIA triad describes: Ensuring that authorized users can access the
information when they are permitted to do so? - ANSWER-Availability

What is a cloud architect? - ANSWER-Expert in cloud computing

What is cloud os also known as? - ANSWER-PaaS

NIST standard number that lists accredited and outmoded cryptosystems - ANSWER-
FIPS 140-2

customer may be unable to leave, migrate, or transfer to an alternate provider due to
technical or non-technical constraints. - ANSWER-vendor lock-m

What is cloud migration? - ANSWER-Process of transitioning part of a company's data
or services from onsite premises to the cloud

,What is cloud portability? - ANSWER-Move applications and data between cloud
providers

What offers a degree of assurance that nobody w/o authorization will be able to access
other's data? - ANSWER-Encryption

If a cloud customer wants a secure, isolated sandbox in order to conduct software
development and testing, which cloud service model would probably be best? -
ANSWER-PaaS

What technology has NOT made cloud service viable? - ANSWER-Smart hubs

What determines the critical paths, processes, and assets of an organization? -
ANSWER-BIA

Fully-operational environment with very little maintenance or administration necessary,
which cloud service model would probably be best? - ANSWER-PaaS

customer is unable to recover or access their own data due to the cloud provider going
into bankruptcy or otherwise leaving the market. - ANSWER-Vendor lock-out

What are four examples of things to know to decide how to handle risks within an org? -
ANSWER-Inventory of all assets
Valuation of each asset
Critical paths, processes, and assets
Clear understanding of risk appetite

T/F: Assets are only tangible items. - ANSWER-False. Assets are everything owned or
controlled by an org.

The process of evaluating assets? - ANSWER-Business Impact Analysis(BIA)

What is criticality? - ANSWER-Something an org could not operate or exist without

What are 5 examples of criticality for an org - ANSWER-Tangible assets
Intangible assets
Processes
Data paths
Personnel

In risk, what is the avoidance method? - ANSWER-Avoiding high risk

In risk, what is the acceptance method? - ANSWER-Acceptable level of risk

In risk, what is an example of the avoidance method? - ANSWER-Insurance

, In risk, what is the mitigation method? - ANSWER-Controls or countermeasures

Assets can be what? - ANSWER-Tangible
Intangible
Personnel

What does Business Impact Analysis do? - ANSWER-Defines which of the assets
provide the intrinsic value of an organization.

What is risk appetite - ANSWER-Level, Amount, or Type of risk that an org finds
acceptable

What is the IaaS boundary? - ANSWER-The provider is responsible for connectivity and
power and the customer is in charge for installation of software.

What is the PaaS boundary? - ANSWER-The provider is responsible for updates and
administration of the OS and the customer monitors and reviews software events.

What is the SaaS boundary? - ANSWER-The provider is responsible for system
maintenance and the customer supplies and processes data to and in the system.

What should encryption be used for in a cloud datacenter? - ANSWER-Long-term
storage/archiving
Protecting near-term stored files, such as snapshots of virtualized instances
Preventing unauthorized access to specific datasets by authorized personnel

What should encryption be used for in communications between cloud providers and
users? - ANSWER-Creating secure sessions
Ensuring the integrity and confidentiality of data in transit

What are 4 controls/mechanisms a cloud provider should play a role in in layered
defense? - ANSWER-Strong personnel controls
Technological controls
Physical controls
Governance mechanisms

In cloud layered defense what are examples of personnel controls? - ANSWER-
background checks
continual monitoring

In cloud layered defense what are examples of technological controls? - ANSWER-
encryption
event logging
access control enforcement
$12.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
LeeErickson

Get to know the seller

Seller avatar
LeeErickson Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
7 months
Number of followers
0
Documents
1323
Last sold
1 month ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions