100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D320 Managing Cloud Security – Latest Exam Questions and Verified Answers | Complete Study Guide

Rating
-
Sold
-
Pages
77
Grade
A+
Uploaded on
13-01-2026
Written in
2025/2026

This document includes up-to-date exam questions and verified answers for the Managing Cloud Security course, aligned with the latest assessment requirements. It covers essential cloud security concepts such as governance, risk, compliance, data protection, and the shared responsibility model to support thorough exam preparation.

Show more Read less
Institution
WGU D320
Course
WGU D320











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU D320
Course
WGU D320

Document information

Uploaded on
January 13, 2026
Number of pages
77
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

WGU D320 MANAGING CLOUD SECURITY EXAM




WGU D320 MANAGING CLOUD SECURITY EXAM | QUESTIONS
AND ANSWERS | VERIFIED ANSWERS | LATEST EXAM




1: Implements Secure Solutions
Which technology should be implemented to ensure secure communication
between on-site enterprise systems and a cloud platform - ANS >>> A. Domain
Name System Security Extensions (DNSSEC)
B. Internet Protocol Security (IPSec) VPN
C. Web Application Firewall (WAF)
D. Data Loss Prevention (DLP)
Correct Answer: B. Internet Protocol Security (IPSec) VPN
Explanation:
• IPSec VPN is designed to secure communication over an IP network. It
encrypts the entire IP packet for secure transmission between on-site systems
and cloud platforms, ensuring data integrity and confidentiality.
• DNSSEC ensures the integrity of DNS responses but doesn't provide secure
communication between systems.
• WAF protects web applications by filtering and monitoring HTTP traffic but is
not used for secure communication between systems.
• DLP prevents data breaches by monitoring and controlling data flows, but it
doesn't establish secure communication channels.


2: Implements Operations
Which phase of the cloud data lifecycle is most likely to overlap with the
'Create' phase in terms of implementing security controls - ANS >>> A. Share

,WGU D320 MANAGING CLOUD SECURITY EXAM




B. Store
C. Use
D. Destroy

,WGU D320 MANAGING CLOUD SECURITY EXAM


Correct Answer: B. Store
Explanation:
• Store often overlaps with the Create phase because as soon as data is created,
it usually needs to be securely stored. Security controls, such as encryption,
should be implemented at this stage.
• Share and Use happen after data is stored.
• Destroy is the final stage in the lifecycle and typically occurs after data is no
longer needed.


3: Conducts Risk Management
Which risk management approach involves completely eliminating a risk
because it exceeds the organization's risk appetite - ANS >>> A. Mitigation
B. Avoidance
C. Transfer
D. Acceptance
Correct Answer: B. Avoidance
Explanation:
• Avoidance involves eliminating the risk entirely, typically when the potential
impact is too great or when controls cannot adequately reduce the risk to an
acceptable level.
• Mitigation involves reducing the risk to an acceptable level.
• Transfer involves shifting the risk to a third party, such as through insurance.
• Acceptance involves acknowledging the risk and choosing to bear it without
further action.


4: Identifies Legal, Compliance, and Ethical Concerns
Which United States law focuses specifically on the privacy of financial
information - ANS >>> A. Health Insurance Portability and Accountability Act
(HIPAA)
B. Sarbanes-Oxley Act (SOX)

, WGU D320 MANAGING CLOUD SECURITY EXAM


C. Gramm-Leach-Bliley Act (GLBA)
D. Safe Harbor
Correct Answer: C. Gramm-Leach-Bliley Act (GLBA)
Explanation:
• GLBA is designed to protect consumer financial privacy by setting regulations
for how financial institutions handle private data.
• HIPAA focuses on healthcare information.
• SOX is concerned with corporate financial practices and reporting.
• Safe Harbor was an agreement between the US and EU for data transfers, not
specifically financial privacy.


1: Implements Secure Solutions
Which technology is most effective in preventing unauthorized access to
sensitive data by ensuring it is unreadable without proper decryption keys - ANS
>>> A. Data Masking

B. Tokenization
C. Encryption
D. Obfuscation
Correct Answer: C. Encryption
Explanation: Encryption transforms readable data into an unreadable format
using cryptographic algorithms, making it inaccessible to unauthorized users.
Tokenization and data masking are also methods of protecting data, but they do
not provide the same level of security as encryption. Obfuscation is the process
of making data more difficult to understand but is not intended to prevent
access.


2: Implements Operations
Which of the following activities is essential during the Secure Operations
phase of the Software Development Lifecycle (SDLC) - CORRECT ANSWER
- A. Static Analysis
B. Code Review

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectsadh havard university
View profile
Follow You need to be logged in order to follow users or courses
Sold
320
Member since
2 year
Number of followers
102
Documents
12286
Last sold
17 hours ago
lectsadh

NURSING SCHOOL IS HARD AM HERE TO SIMPLIFY THE INFORMATION AND MAKE IT EASIER!! My mission is to be your light in the dark, if you are worried or having trouble in nursing school, i really want my notes to be your guide, stay with me and you will find everything you need to study and pass any tests, quizzes and exams! Assisting students with quality work is my first priority. I know how frustrating it can get with all those assignments mate! I have essential guides that are A graded. Get verified solutions from LECTSADH.

Read more Read less
4.0

71 reviews

5
39
4
7
3
16
2
4
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions