100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU - D320WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND CORRECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRADED A+]

Rating
-
Sold
-
Pages
40
Grade
A+
Uploaded on
12-05-2025
Written in
2024/2025

WGU - D320WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND CORRECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRADED A+]

Institution
WGU - D320
Course
WGU - D320











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU - D320
Course
WGU - D320

Document information

Uploaded on
May 12, 2025
Number of pages
40
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

WGU - D320\WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND C
RECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRAD
A+]
Study online at https://quizlet.com/_h8x4pa

1. 1: Implements Se- A. Domain Name System Security Extensions (DNSSEC)
cure Solutions B. Internet Protocol Security (IPSec) VPN
Which technology C. Web Application Firewall (WAF)
should be imple- D. Data Loss Prevention (DLP)
mented to ensure Correct Answer: B. Internet Protocol Security (IPSec) VPN
secure commu- Explanation:
nication between • IPSec VPN is designed to secure communication over an IP network. It encrypts
on-site enterprise the entire IP packet for secure transmission between on-site systems and cloud
systems and a platforms, ensuring data integrity and confidentiality.
cloud platform • DNSSEC ensures the integrity of DNS responses but doesn't provide secure
communication between systems.
• WAF protects web applications by filtering and monitoring HTTP traffic but is
not used for secure communication between systems.
• DLP prevents data breaches by monitoring and controlling data flows, but it
doesn't establish secure communication channels.

2. 2: Implements A. Share
Operations B. Store
Which phase of C. Use
the cloud data D. Destroy
lifecycle is most Correct Answer: B. Store
likely to overlap Explanation:
with the 'Create' • Store often overlaps with the Create phase because as soon as data is created, it
phase in terms of usually needs to be securely stored. Security controls, such as encryption, should
implementing se- be implemented at this stage.
curity controls • Share and Use happen after data is stored.
• Destroy is the final stage in the lifecycle and typically occurs after data is no
longer needed.

3.


, WGU - D320\WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND C
RECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRAD
A+]
Study online at https://quizlet.com/_h8x4pa
3: Conducts Risk A. Mitigation
Management B. Avoidance
Which risk man- C. Transfer
agement ap- D. Acceptance
proach involves Correct Answer: B. Avoidance
completely elimi- Explanation:
nating a risk be- • Avoidance involves eliminating the risk entirely, typically when the potential
cause it exceeds impact is too great or when controls cannot adequately reduce the risk to an
the organization's acceptable level.
risk appetite • Mitigation involves reducing the risk to an acceptable level.
• Transfer involves shifting the risk to a third party, such as through insurance.
• Acceptance involves acknowledging the risk and choosing to bear it without
further action.

4. 4: Identifies Legal, A. Health Insurance Portability and Accountability Act (HIPAA)
Compliance, and B. Sarbanes-Oxley Act (SOX)
Ethical Concerns C. Gramm-Leach-Bliley Act (GLBA)
Which United D. Safe Harbor
States law focuses Correct Answer: C. Gramm-Leach-Bliley Act (GLBA)
specifically on the Explanation:
privacy of finan- • GLBA is designed to protect consumer financial privacy by setting regulations
cial information for how financial institutions handle private data.
• HIPAA focuses on healthcare information.
• SOX is concerned with corporate financial practices and reporting.
• Safe Harbor was an agreement between the US and EU for data transfers, not
specifically financial privacy.

5. 1: Implements Se- A. Data Masking
cure Solutions B. Tokenization
Which technolo- C. Encryption



, WGU - D320\WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND C
RECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRAD
A+]
Study online at https://quizlet.com/_h8x4pa
gy is most effec- D. Obfuscation
tive in prevent- Correct Answer: C. Encryption
ing unauthorized Explanation: Encryption transforms readable data into an unreadable format
access to sensi- using cryptographic algorithms, making it inaccessible to unauthorized users.
tive data by en- Tokenization and data masking are also methods of protecting data, but they do
suring it is un- not provide the same level of security as encryption. Obfuscation is the process of
readable without making data more difficult to understand but is not intended to prevent access.
proper decryption
keys

6. 2: Implements A. Static Analysis
Operations B. Code Review
Which of the fol- C. Dynamic Analysis
lowing activities is D. Acceptance Testing
essential during Correct Answer: C. Dynamic Analysis
the Secure Oper- Explanation: Dynamic Analysis is crucial during the secure operations phase
ations phase of because it involves testing the software in a runtime environment, identifying
the Software De- security vulnerabilities that might only become apparent during execution. Static
velopment Lifecy- Analysis and Code Review are performed earlier in the SDLC, and Acceptance
cle (SDLC) Testing is typically done after secure operations to verify the system meets the
requirements.

7. 3: Conducts Risk A. Risk Mitigation
Management B. Risk Avoidance
Which risk man- C. Risk Transference
agement ap- D. Risk Acceptance
proach involves Correct Answer: C. Risk Transference
the transfer of risk Explanation: Risk Transference involves shifting the impact of a risk to a third
to another party, party, often by using insurance or outsourcing certain activities. Risk Mitigation




, WGU - D320\WGU D320 COMPLETE COMPREHENSIVE QUESTIONS AND C
RECT SOLUTIONS OBJECTIVE ASSESSMENT NEWEST 2024 [ALREADY GRAD
A+]
Study online at https://quizlet.com/_h8x4pa
such as through involves reducing the risk, Risk Avoidance involves eliminating the risk, and Risk
insurance Acceptance involves acknowledging and accepting the risk without further action.

8. 4: Identifies Legal, A. Sarbanes-Oxley Act (SOX)
Compliance, and B. Health Insurance Portability and Accountability Act (HIPAA)
Ethical Concerns C. Gramm-Leach-Bliley Act (GLBA)
Which U.S. law fo- D. Federal Information Security Management Act (FISMA)
cuses specifically Correct Answer: B. Health Insurance Portability and Accountability Act (HIPAA)
on the protection Explanation: HIPAA sets standards for the protection of personal health informa-
of personal health tion. SOX is related to corporate financial practices, GLBA focuses on financial
information privacy, and FISMA applies to federal information security management.

9. 5: Implements Se- A. Software as a Service (SaaS)
cure Solutions B. Platform as a Service (PaaS)
Which cloud ser- C. Infrastructure as a Service (IaaS)
vice model re- D. Containers as a Service (CaaS)
quires the cus- Correct Answer: C. Infrastructure as a Service (IaaS)
tomer to manage Explanation: In IaaS, the provider manages the underlying infrastructure, while
the security of the the customer is responsible for managing the security of the operating system,
operating system, applications, and data. In SaaS, the provider manages everything, including
applications, and security. PaaS offers more management of security, but the customer still handles
data application security.

10. 6: Implements A. Ensure high availability of cloud services
Operations B. Recover operations after a catastrophic event
What is the prima- C. Perform routine backups of data
ry goal of imple- D. Prevent unauthorized access to cloud resources
menting a Disas- Correct Answer: B. Recover operations after a catastrophic event
ter Recovery Plan Explanation: The main goal of a Disaster Recovery Plan is to recover business
operations as quickly as possible after a catastrophic event. High availability is a

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTotur2 Walden University
View profile
Follow You need to be logged in order to follow users or courses
Sold
117
Member since
8 months
Number of followers
15
Documents
2460
Last sold
1 hour ago
Teachme2 TUTOR

Hi! ,I'm Nurse Simeon , a certified TeachMe2 Totur with over 5 helping University and college students succeed. I am a Verified Nursing Tutor specializing in Ihuman Case Studies, Advanced pharmacology (NR565), HESI, TEAS 7, Pediatrics and More, creating HIGH QUALITY,EXAM FOCUSED STUDY GUIDES. Every document is crafted to be clear, accurate, and easy understanding saving you study time and improving your grades. Whatever you are preparing for Hesi A2, NCLEX or University coursework ,my notes are trusted by hundreds of students like you. ✅ Backed by toturing experience. ✅ Organized by topic and exam need. ✅ Instant access and affordable pricing. Let's help you pass smarter ,not harder. Browse my store now !

Read more Read less
3.1

17 reviews

5
3
4
4
3
5
2
1
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions