WGU C838 - MANAGING CLOUD SECURITY
Which phase of the cloud data life cycle allows both read and process functions to be
performed?
A Create
B Archive
C Store
D Share - answer- A
Which phase of the cloud data security life cycle typically occurs simultaneously with
creation?
A Share
B Store
C Use
D Destroy - answer- B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - answer- C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store - answer- C
Who retains final ownership for granting data access and permissions in a shared
responsibility model?
A Customer
B Developer
C Manager
D Analyst - answer- A
Which data retention solution should be applied to a file in order to reduce the data
footprint by deleting fixed content and duplicate data?
A Backup
B Caching
,C Archiving
D Saving - answer- C
Which data retention method is stored with a minimal amount of metadata storage with
the content?
A File system
B Redundant array
C Object-based
D Block-based - answer- D
What is a key capability of security information and event management?
A Intrusion prevention capabilities
B Automatic remediation of issues
C Centralized collection of log data
D Secure remote access - answer- C
Which data source provides auditability and traceability for event investigation as well
as documentation?
A Storage files
B Packet capture
C Network interference
D Database tables - answer- B
Which data source provides auditability and traceability for event investigation as well
as documentation?
A Network segmentation
B Ephemeral storage
C Database schema
D Virtualization platform logs - answer- D
Which technology is used to manage identity access management by building trust
relationships between organizations?
A Single sign-on
B Multifactor authentication
C Federation
D Biometric authentication - answer- C
Which term describes the action of confirming identity access to an information system?
A Coordination
B Concept
C Access
,D Authentication - answer- D
Which cloud computing tool is used to discover internal use of cloud services using
various mechanisms such as network monitoring?
A Data loss prevention (DLP)
B Content delivery network (CDN)
C Cloud access security broker (CASB)
D Web application firewall (WAF) - answer- C
Which cloud computing technology unlocks business value through digital and physical
access to maps?
A Multitenancy
B Cloud application
C Application programming interface
D On-demand self-service - answer- C
Which cloud computing tool may help detect data migrations to cloud services?
A Uniform resource locator (URL) filtering
B Cloud security gateways
C Cloud data transfer
D Data loss prevention - answer- D
What is a key component of the infrastructure as a service (IaaS) cloud service model?
A Allows choice and reduces lock-in
B Supports multiple languages and frameworks
C Ease of use and limited administration
D High reliability and resilience - answer- D
What is a key capability of infrastructure as a service (IaaS)?
A Hosted application management
B Converged network and IT capacity pool
C Leased application and software licensing
D Multiple hosting environments - answer- B
Which option should an organization choose if there is a need to avoid software
ownership?
A Software as a service (SaaS)
B Platform as a service (PaaS)
C Containers as a service (CaaS)
D Infrastructure as a service (IaaS) - answer- A
, Which cloud model offers access to a pool of fundamental IT resources such as
computing, networking, or storage?
A Infrastructure
B Platform
C Application
D Data - answer- A
In which situation could cloud clients find it impossible to recover or access their own
data if their cloud provider goes bankrupt?
A Vendor lock-in
B Multitenant
C Multicloud
D Vendor lock-out - answer- D
Which cloud deployment model is operated for a single organization?
A Consortium
B Hybrid
C Public
D Private - answer- D
Which cloud model provides data location assurance?
A Hybrid
B Private
C Community
D Public - answer- B
Which cloud model allows the consumer to have sole responsibility for management
and governance?
A Hybrid
B Community
C Private
D Public - answer- C
Which technology allows an organization to control access to sensitive documents
stored in the cloud?
A Digital rights management (DRM)
B Database activity monitoring (DAM)
C Identity and access management (IAM)
D Distributed resource scheduling (DRS) - answer- A
Which phase of the cloud data life cycle allows both read and process functions to be
performed?
A Create
B Archive
C Store
D Share - answer- A
Which phase of the cloud data security life cycle typically occurs simultaneously with
creation?
A Share
B Store
C Use
D Destroy - answer- B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - answer- C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store - answer- C
Who retains final ownership for granting data access and permissions in a shared
responsibility model?
A Customer
B Developer
C Manager
D Analyst - answer- A
Which data retention solution should be applied to a file in order to reduce the data
footprint by deleting fixed content and duplicate data?
A Backup
B Caching
,C Archiving
D Saving - answer- C
Which data retention method is stored with a minimal amount of metadata storage with
the content?
A File system
B Redundant array
C Object-based
D Block-based - answer- D
What is a key capability of security information and event management?
A Intrusion prevention capabilities
B Automatic remediation of issues
C Centralized collection of log data
D Secure remote access - answer- C
Which data source provides auditability and traceability for event investigation as well
as documentation?
A Storage files
B Packet capture
C Network interference
D Database tables - answer- B
Which data source provides auditability and traceability for event investigation as well
as documentation?
A Network segmentation
B Ephemeral storage
C Database schema
D Virtualization platform logs - answer- D
Which technology is used to manage identity access management by building trust
relationships between organizations?
A Single sign-on
B Multifactor authentication
C Federation
D Biometric authentication - answer- C
Which term describes the action of confirming identity access to an information system?
A Coordination
B Concept
C Access
,D Authentication - answer- D
Which cloud computing tool is used to discover internal use of cloud services using
various mechanisms such as network monitoring?
A Data loss prevention (DLP)
B Content delivery network (CDN)
C Cloud access security broker (CASB)
D Web application firewall (WAF) - answer- C
Which cloud computing technology unlocks business value through digital and physical
access to maps?
A Multitenancy
B Cloud application
C Application programming interface
D On-demand self-service - answer- C
Which cloud computing tool may help detect data migrations to cloud services?
A Uniform resource locator (URL) filtering
B Cloud security gateways
C Cloud data transfer
D Data loss prevention - answer- D
What is a key component of the infrastructure as a service (IaaS) cloud service model?
A Allows choice and reduces lock-in
B Supports multiple languages and frameworks
C Ease of use and limited administration
D High reliability and resilience - answer- D
What is a key capability of infrastructure as a service (IaaS)?
A Hosted application management
B Converged network and IT capacity pool
C Leased application and software licensing
D Multiple hosting environments - answer- B
Which option should an organization choose if there is a need to avoid software
ownership?
A Software as a service (SaaS)
B Platform as a service (PaaS)
C Containers as a service (CaaS)
D Infrastructure as a service (IaaS) - answer- A
, Which cloud model offers access to a pool of fundamental IT resources such as
computing, networking, or storage?
A Infrastructure
B Platform
C Application
D Data - answer- A
In which situation could cloud clients find it impossible to recover or access their own
data if their cloud provider goes bankrupt?
A Vendor lock-in
B Multitenant
C Multicloud
D Vendor lock-out - answer- D
Which cloud deployment model is operated for a single organization?
A Consortium
B Hybrid
C Public
D Private - answer- D
Which cloud model provides data location assurance?
A Hybrid
B Private
C Community
D Public - answer- B
Which cloud model allows the consumer to have sole responsibility for management
and governance?
A Hybrid
B Community
C Private
D Public - answer- C
Which technology allows an organization to control access to sensitive documents
stored in the cloud?
A Digital rights management (DRM)
B Database activity monitoring (DAM)
C Identity and access management (IAM)
D Distributed resource scheduling (DRS) - answer- A