Package deal
WGU - C838 Test Exam Bundle
WGU - C838 Test Exam Bundle
[Show more]WGU - C838 Test Exam Bundle
[Show more]Which phase of the cloud data life cycle allows both read and process functions to be performed? 
 
A Create 
B Archive 
C Store 
D Share - A 
 
Which phase of the cloud data security life cycle typically occurs simultaneously with creation? 
 
A Share 
B Store 
C Use 
D Destroy - B 
 
Whic...
Preview 4 out of 173 pages
Add to cartWhich phase of the cloud data life cycle allows both read and process functions to be performed? 
 
A Create 
B Archive 
C Store 
D Share - A 
 
Which phase of the cloud data security life cycle typically occurs simultaneously with creation? 
 
A Share 
B Store 
C Use 
D Destroy - B 
 
Whic...
What are the 4 characteristics of cloud computing? - Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
What NIST publication number defines cloud computing? - 800-145 
 
What ISO/IEC standard provides information on cloud computing? - 17788 
 
Wh...
Preview 4 out of 38 pages
Add to cartWhat are the 4 characteristics of cloud computing? - Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
What NIST publication number defines cloud computing? - 800-145 
 
What ISO/IEC standard provides information on cloud computing? - 17788 
 
Wh...
"Which phase of the cloud data lifecycle allows both read and process functions to be performed? 
(A) Share 
(B) Store 
(C) Create 
(D) Archive" - Create 
 
"Which phase of the cloud data security lifecycle typically occurs simultaneously with creation? 
(A) Use 
(B) Share 
(C) Store 
(D) Dest...
Preview 3 out of 23 pages
Add to cart"Which phase of the cloud data lifecycle allows both read and process functions to be performed? 
(A) Share 
(B) Store 
(C) Create 
(D) Archive" - Create 
 
"Which phase of the cloud data security lifecycle typically occurs simultaneously with creation? 
(A) Use 
(B) Share 
(C) Store 
(D) Dest...
Broad network access - There should never be network bandwidth bottlenecks. 
 
On-demand services - Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
Resource pooling - Chara...
Preview 2 out of 6 pages
Add to cartBroad network access - There should never be network bandwidth bottlenecks. 
 
On-demand services - Refers to the model that allows customers to scale their compute and/or storage needs with little or no intervention from or prior communication with the provider. 
 
Resource pooling - Chara...
Answers Spring 2021 
Which phase of the cloud data lifecycle allows both read and process functions to be performed? - Create 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? - Format-preserving encryption 
 
...
Preview 2 out of 6 pages
Add to cartAnswers Spring 2021 
Which phase of the cloud data lifecycle allows both read and process functions to be performed? - Create 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? - Format-preserving encryption 
 
...
International Traffic in Arms Regulation (ITAR) - USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
Export Administration Regulations - Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but ...
Preview 2 out of 6 pages
Add to cartInternational Traffic in Arms Regulation (ITAR) - USA - state dept prohibitions on defense related exports. This can include cryptographic systems. 
 
Export Administration Regulations - Department of Commerce 
 
Control: dual-use goods/software/technology predominately civilian in nature but ...
NIST 800-145 Cloud Computing Definition - A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
Business Impact Analy...
Preview 4 out of 42 pages
Add to cartNIST 800-145 Cloud Computing Definition - A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
Business Impact Analy...
Elasticity - This is the flexibility of allocating resources as needed for immediate usage, instead of purchasing resources according to other variables 
 
Simplicity - Usage and administration of cloud services ought to be transparent to cloud customers and users; from their perspective, a di...
Preview 3 out of 29 pages
Add to cartElasticity - This is the flexibility of allocating resources as needed for immediate usage, instead of purchasing resources according to other variables 
 
Simplicity - Usage and administration of cloud services ought to be transparent to cloud customers and users; from their perspective, a di...
_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics except: 
n...
Preview 4 out of 41 pages
Add to cart_____ drive security decisions. 
business requirements 
 
 
All of these are reasons because of which an organization may want to consider cloud migration, except: 
Elimination of risks 
 
 
The generally accepted definition of cloud computing includes all of the following characteristics except: 
n...
(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
Preview 3 out of 17 pages
Add to cart(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
(ISC)2 Cloud...
NIST 800-53 - Security and Privacy Contols for Information Systems and Organizations 
 
NIST 500-292 - Cloud Computing Reference Architecture 
 
NIST 800-37 - Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
NIST 800-57 - ...
Preview 1 out of 2 pages
Add to cartNIST 800-53 - Security and Privacy Contols for Information Systems and Organizations 
 
NIST 500-292 - Cloud Computing Reference Architecture 
 
NIST 800-37 - Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach 
 
NIST 800-57 - ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller TeeGrades. Stuvia facilitates payment to the seller.
No, you only buy these notes for $29.99. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
97255 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now