Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM

Rating
-
Sold
-
Pages
36
Grade
A+
Uploaded on
25-06-2023
Written in
2022/2023

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |A+GRADE

Content preview

WGU C838 MANAGING CLOUD
SECURITY FINAL EXAM OA 100
QUESTIONS AND ANSWERS LATEST
2023-2024 |AGRADE


1) You are the security subject matter expert (SME) for an organization
considering a transition from the legacy environment into a hosted cloud provider
's data center. One of the challenges you 're facing is whether the cloud provider
will be able to comply with the existing legislative and contractual frameworks
your organization is required to follow. This is a _________ issue.

a. Resiliency
b. Privacy
c. Performance
d. Regulatory - ANSWER- D

2. You are the security subject matter expert (SME) for an organization considering
a transition from the legacy environ ment into a hosted cloud provider 's data
center. One of the challenges you 're facing is whether the cloud provider will be
able to allow your organization to substantiate and determine with some assurance
that all of the contract terms are being met. This is a(n) ____________ issue.
a. Regulatory
b. Privacy
c. Resiliency
d. Auditability - ANSWER- D

3. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.

,c. It might result in vendor lockout.
d. The data subjects might be upset by this. - ANSWER- B

4. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. It could increase the possibility of physical theft.
b. Encryption won 't work throughout the environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within the organization. - ANSWER- C

5. Which of the following is not an element of the identification component of
identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisioning - ANSWER- C

6. Which of the following entities is most likely to play a vital role in the identity
provisioning aspect of a user 's experience in an organization?
a. The accounting department
b. The human resources (HR) office
c. The maintenance team
d. The purchasing office - ANSWER- B

7. Why is the deprovisioning element of the identification component of identity
and access management (IAM) so important? a. Extra accounts cost so much
extra money.
b. Open but unassigned accounts are vulnerabilities.
c. User tracking is essential to performance.
d. Encryption has to be maintained. - ANSWER- B

8. All of the following are reasons to perform review and maintenance actions on
user accounts except ____________.
a. To determine whether the user still needs the same access

,b. To determine whether the user is still with the organization
c. To determine whether the data set is still applicable to the user 's role
d. To determine whether the user is still performing well - ANSWER- D

9. Who should be involved in review and maintenance of user accounts/access?
a. The user 's manager
b. The security manager
c. The accounting department
d. The incident response team - ANSWER- A

10. Which of the following protocols is most applicable to the identification
process aspect of identity and access management (IAM)?
a. Secure Sockets Layer (SSL)
b. Internet Protocol security (IPsec)
c. Lightweight Directory Access Protocol (LDAP)
d. Amorphous ancillary data transmission (AADT) - ANSWER- C

11. Privileged user (administrators, managers, and so forth) accounts need to be
reviewed more closely than basic user accounts. Why is this? a. Privileged
users have more encryption keys.
b. Regular users are more trustworthy.
c. There are extra controls on privileged user accounts.
d. Privileged users can cause more damage to the organization. - ANSWER- D

12. The additional review activities that might be performed for privileged user
accounts could include all of the following except _____________. a. Deeper
personnel background checks
b. Review of personal financial accounts for privileged users
c. More frequent reviews of the necessity for access
d. Pat-down checks of privileged users to deter against physical theft - ANSWER-
D

13. If personal financial account reviews are performed as an additional review
control for privileged users, which of the following characteristics is least likely to
be a useful indicator for review purposes? a. Too much money in the account
b. Too little money in the account
c. The bank branch being used by the privileged user

, d. Specific senders/recipients - ANSWER- C

14. How often should the accounts of privileged users be reviewed? a.
Annually
b. Twice a year
c. Monthly
d. More often than regular user account reviews - ANSWER- D

15. Privileged user account access should be __________.
a. Temporary
b. Pervasive
c. Thorough
d. Granular - ANSWER- A

16. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According to
the CSA 's Notorious Nine list, data breaches can be ____________. a. Overt or
covert
b. International or subterranean
c. From internal or external sources
d. Voluminous or specific - ANSWER- C

17. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According to
the CSA, an organization that operates in the cloud environment and suffers a data
breach may be required to __________. a. Notify affected users
b. Reapply for cloud service
c. Scrub all affected physical memory
d. Change regulatory frameworks - ANSWER- A

18. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According to
the CSA, an organization that suffers a data breach might suffer all of the
following negative effects except __________. a. Cost of compliance with
notification laws
b. Loss of public perception/goodwill
c. Loss of market share

Document information

Uploaded on
June 25, 2023
Number of pages
36
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers
£8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
QUIZHELPER2023

Get to know the seller

Seller avatar
QUIZHELPER2023 Cambridge University
View profile
Follow You need to be logged in order to follow users or courses
Sold
3
Member since
2 year
Number of followers
3
Documents
109
Last sold
2 year ago
justus solutions

an outstanding source of study guide, notes, questions and answers. I am about quality. The documents herein guarantees an A+ for exams, essays, class discussions, term papers, quiz lets and Q & A assignments. Do not heistate to make your purchase. Investing in education is a life investment

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions