WGU C838 OA Questions and Answers
Which phase of the cloud data lifecycle allows both read and
process functions to be performed?
Ans: Create
Which technique scrambles the content of data using a
mathematical algorithm while keeping the structural arrangement
of the data?
Ans: Format-preserving encryption
Which encryption technique connects the instance to the
encryption instance that handles all crypto operations?
Ans: Proxy
Which type of control should be used to implement custom
controls that safeguard data?
Ans: Application level
A cloud administrator recommends using tokenization as an
alternative to protecting data without encryption. The
administrator needs to make an authorized application request to
access the data. Which step should occur immediately before this
action is taken?
Ans: The application stores the token
A company has recently defined classification levels for its data.
During which phase of the cloud data life cycle should this
definition occur?
Ans: Create
© 2025 All rights reserved
, 2 | Page
How is the compliance of the cloud service provider's legal and
regulatory requirements verified when securing personally
identifiable information (PII) data in the cloud?
Ans: Third party audits and attestations
Which security strategy is associated with data rights
management solutions?
Ans: Continuous auditing
What is a key capability of security information and event
management?
Ans: Centralized collection of big data
A security analyst is investigating an incident of access to a
resource from an unauthorized location. Which data source should
the security analyst use to investigate the incident?
Ans: Packet capture file
Which message type is generated from software systems to
troubleshoot and identify problems with running application
codes?
Ans: Debug
Which cloud computing tool is used to discover internal use of
cloud services using various mechanisms such as network
monitoring?
Ans: Cloud access security broker (CASB)
Which cloud model provides data location assurance?
Ans: Private
Which technology allows an organization to control access to
sensitive documents stored in the cloud?
© 2025 All rights reserved