100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

D320 - Managing Cloud Security

Rating
-
Sold
-
Pages
24
Uploaded on
01-08-2025
Written in
2025/2026

D320 - Managing Cloud Security











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 1, 2025
Number of pages
24
Written in
2025/2026
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

Science Computer Science Computer Security and Reliability Save




D320 - Managing Cloud Security
31 studiers today 4.8 (15 reviews)




Students also studied


Flashcard sets Study guides



D320 (C838) Laws, Regulations, and ... WGU Course C838 - Managing Clou... Security+ Exam Prep Module 1 Threat

105 terms 1,037 terms 12 terms Teacher




wgu0408 Preview WieldyStone2 Preview Rfernandez75 Preview Vic


 




Terms in this set (701)


Which phase of the cloud data life cycle B
requires adherence to export and import
restrictions, including Export Administration
Regulations (EAR) and the Wassenaar
Arrangement?


A) Create
B) Share
C) Use
D) Destroy

Why is the striping method of storing data D
used in most redundant array of
independent disks (RAID) configurations?


A) It prevents outages and attacks from
occurring in a cloud environment.
B) It prevents data from being recovered
once it is destroyed using crypto-
shredding.
C) It allows data to be safely distributed
and stored in a common centralized
location.
D) It allows efficient data recovery as even
if one drive fails, other drives fill in the
missing data.

,What is the purpose of egress monitoring B
tools?


A) They are used to convert a given set of
data or information into a different value.
B) They are used to prevent data from
going outside the control of an
organization.
C) They are used to create data during the
Create phase of the cloud data life cycle.
D) They are used to remove data during the
Destroy phase of the cloud data life cycle.

A company is looking at different types of D
cloud storage options. One of the threats
to cloud storage that the company
foresees is the possibility of losing forensic
artifacts in the event of an incident
response investigation.


Which type of cloud storage has the
highest risk of losing forensic artifacts in
the event of an incident response
investigation?


A) File-based
B) Long-term
C) Block
D) Ephemeral

A manager is made aware of a customer C
complaint about how an application
developed by the company collects
personal and environmental information
from the devices it is installed on.


Which document should the manager refer
to in order to determine if the company has
properly disclosed information about what
data it collects from this application's
users?


A) Retention policy
B) Breach notification
C) Privacy notice
D) Denial of service

An organization needs to store passwords B
in a database securely. The data should not
be available to system administrators.
Which technique should the organization
use?


A) Encryption
B) Hashing
C) Encoding
D) Masking

, A company is looking to ensure that the C
names of individuals in its data in the cloud
are not revealed in the event of a data
breach, as the data is sensitive and
classified.
Which data masking technique should the
company use to prevent attackers from
identifying individuals in the event of a data
breach?


A) Crypto-shredding
B) Degaussing
C) Anonymization
D) Randomization

An organization needs to quickly identify A
the document owner in a shared network
folder.
Which technique should the organization
use to meet this goal?


A) Labeling
B) Classification
C) Mapping
D) Categorization

An organization plans to introduce a new A
data standard and wants to ensure that
system inventory data will be efficiently
discovered and processed.
Which type of data should the organization
use to meet this goal?


A) Structured
B) Semi-structured
C) Annotated
D) Mapped

An organization implemented an C
information rights management (IRM)
solution to prevent critical data from being
copied without permission and a cloud
backup solution to ensure that the critical
data is protected from storage failures.


Which IRM challenge will the organization
need to address?


A) Jurisdictional conflicts
B) Agent conflicts
C) Replication restrictions
D) Execution restrictions

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
docwayne5 walden university
View profile
Follow You need to be logged in order to follow users or courses
Sold
126
Member since
2 year
Number of followers
24
Documents
3219
Last sold
1 day ago
TEACH ME TO

I HEIP STUDENTS WITH ALL TYPE OF EXAMZ LIKE NGN,ATI,HESI,PN COMPREHENSION., FIREFIGHTER ,ECONOMICS .ENGLISH,SPANISH.MATHEMATICS .......TO SCORE A+

4.9

708 reviews

5
666
4
19
3
12
2
4
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions