100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU-C838-PRE-ASSESSMENT QUESTIONS AND ANSWERS LATEST UPDATED VERSION|| WGU-C838-PRE-ASSESSMENT (BRAND NEW)

Rating
-
Sold
-
Pages
21
Grade
A+
Uploaded on
03-12-2025
Written in
2025/2026

WGU-C838-PRE-ASSESSMENT QUESTIONS AND ANSWERS LATEST UPDATED VERSION|| WGU-C838-PRE-ASSESSMENT (BRAND NEW)

Institution
WGU-C838
Course
WGU-C838










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU-C838
Course
WGU-C838

Document information

Uploaded on
December 3, 2025
Number of pages
21
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU-C838-PRE-ASSESSMENT QUESTIONS
AND ANSWERS LATEST UPDATED
VERSION|| WGU-C838-PRE-ASSESSMENT
(BRAND NEW)
"Which artifact may be required as a data source for a compliance audit in a cloud
environment?
(A) Customer SLAs
(B) Change management details
(C) Quarterly revenue projections
(D) Annual actual-to-budgeted expense reports" -Answer Change management details

"Which artifact may be required as a data source for a regulatory compliance audit (i.e.,
HIPAA, PCI-DSS) in a cloud environment?
(A) System configuration details
(B) Quarterly revenue projections
(C) System performance benchmarks
(D) Annual actual-to-budgeted expenses" -Answer System configuration details

"Which item would be a risk for an enterprise considering contracting with a cloud
service provider?
(A) 99.99% up time guarantees
(B) No SLA exclusion penalties
(C) Very expensive SLA provider penalties
(D) Suspension of service if payment is delinquent" -Answer Suspension of service if
payment is delinquent

"Which phase of the cloud data lifecycle allows both read and process functions to be
performed?
(A) Share
(B) Store
(C) Create
(D) Archive" -Answer Create

"Which phase of the cloud data security lifecycle typically occurs simultaneously with
creation?
(A) Use
(B) Share
(C) Store
(D) Destroy" -Answer Store

"Which phase of the cloud data life cycle uses content delivery networks?
(A) Share
(B) Create
(C) Destroy

,(D) Archive" -Answer Share

"Which phase of the cloud data life cycle is associated with crypto-shredding?
(A) Use
(B) Store
(C) Share
(D) Destroy" -Answer Destroy

"Which cloud data storage architecture allows sensitive data to be replaced with unique
identification symbols that retain all the essential information about the data without
compromising its security?
(A) Obfuscation
(B) Tokenization
(C) Anonymization
(D) Randomization" -AnswerTokenization

"Which methodology could cloud data storage utilize to encrypt all data associated in an
infrastructure as a service (IaaS) deployment model?
(A) Sandbox encryption
(B) Client-side encryption
(C) Polymorphic encryption
(D) Whole-instance encryption" -AnswerWhole-instance encryption

, "There is a threat to a banking cloud platform service. The developer needs to provide
inclusion in a relational database that is seamless and readily searchable by search
engine algorithms. Which platform as a service (PaaS) data type should be used?
(A) Structured
(B) Unstructured
(C) Long-term storage
(D) Short-term storage" -AnswerStructured

"Which platform as a service (PaaS) storage architecture should be used if an
organization wants to store presentations, documents, and audio files?
(A) Block
(B) Object
(C) Distributed
(D) Relational database" -AnswerObject

"Which technique scrambles the content of data using a mathematical algorithm while
keeping the structural arrangement of the data?
(A) Tokenization
(B) Dynamic masking
(C) Proxy-based encryption
(D) Format-preserving encryption" -AnswerFormat-preserving encryption

"Which encryption technique connects the instance to the encryption instance that
handles all crypto operations?
(A) Proxy
(B) Database
(C) Server-side
(D) Externally managed" -AnswerProxy

"Which type of control should be used to implement custom controls that safeguard
data?
(A) Application level
(B) Management plane
(C) Options for access
(D) Public and internal sharing" -AnswerApplication level

"Which element is protected by an encryption system?
(A) Data
(B) Public key
(C) Ciphertext
(D) Management engine" -AnswerData

"A cloud administrator recommends using tokenization as an alternative to protecting
data without encryption. The administrator needs to make an authorized application
request to access the data.
Which step should occur immediately before this action is taken?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
atihesitutor23 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
27
Member since
2 year
Number of followers
5
Documents
722
Last sold
1 week ago
SCHOLAR'S STUDY HUB. ACHIEVE MORE WITH EXPERT MATERIALS THAT GUARANTEE GOOD RESULTS!

BRONZE RATED SELLER ON STUVIA – YOUR TRUSTED HUB FOR EXCEPTIONAL STUDY RESOURCES! ACHIEVE MORE WITH EXPERTLY CRAFTED MATERIALS THAT GUARANTEE GOOD RESULTS! Am an expert on major courses especially; Psychology, Nursing, Accounting, IT, Human resource Management and Mathematics ,Business Economics Assisting students with quality work is my first priority. I ensure scholarly standards in my documents and that's why I'm one of the Good RATED TUTORS in STUVIA. I assure a GOOD GRADE if you use my work. Also has a remarkable reputation therefore gives accurate, detailed and verified revision materials leading to academic excellence. Success is our second name!! Scholar's Most Trusted Store; Add to Cart for A+ Achievement. Did my resources help you succeed? I’d love to hear about your experience! Please leave a review of your experience with our study documents.

Read more Read less
3.3

6 reviews

5
3
4
0
3
0
2
2
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions