100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

WGU C838 Managing Cloud Security Final Exam Guide | 430 Practice Questions & Answers

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
02-11-2025
Written in
2025/2026

Prepare for the WGU C838 Managing Cloud Security Final Exam with this comprehensive study resource. This guide includes 430 practice questions and verified answers covering all key topics for the 2025/2026 objective assessment. Key areas include cloud service models (IaaS, PaaS, SaaS), deployment models, risk management, data security, legal compliance, BC/DR planning, encryption, identity and access management, and more. Ideal for students aiming to master cloud security concepts and achieve an A+ grade on the OA.

Show more Read less
Institution
WGU C838 MANAGING CLOUD SECURITY
Course
WGU C838 MANAGING CLOUD SECURITY











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
WGU C838 MANAGING CLOUD SECURITY
Course
WGU C838 MANAGING CLOUD SECURITY

Document information

Uploaded on
November 2, 2025
Number of pages
33
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

1 of 33


WGU C838 MANAGING CLOUD SECURITY FINAL EXAM
OBJECTIVE ASSESSMENT / WGU C838 OA PREPARATION/ 2025/2026
WGU C838 OA PRACTICE WITH COMPLETE 430 QUESTIONS AND
ANSWERS LATEST |A+GRADE

T/F: Risk and responsibilities will be shared between the cloud provider and customer
- ......ANSWER........True

T/F: SAS 70 report is no longer being used - ......ANSWER........True

T/F: The customer is concerned with data, whereas the provider is concerned with
security and operation - ......ANSWER........True

T/F: The customer is legally liable for their data even if the provider was negligent.
- ......ANSWER........True

T/F: The customer wants to refute control, deny insight, and refrain from disclosing
any information used for malicious purpose - ......ANSWER........False

T/F: The goals of DLP include elasticity - ......ANSWER........False

T/F: The value of data is a component of contractual PII - ......ANSWER........False

The process of evaluating assets? - ......ANSWER........Business Impact Analysis (BIA)

Volume storage is associated with what infrastructure model?
- ......ANSWER........Infrastructure as a Service (IaaS)

Vulnerability assessment, firewall, honeypot, and IDS/IPS are methods used for what?
- ......ANSWER........securing a network

What 3 models are generally available for cloud BCDR? - ......ANSWER........Private
architecture, cloud backup cloud provider, back from same provider cloud provider,
backup from another cloud provider

What act conforms to the EU Data Directive and Privacy Regulation?
- ......ANSWER........PIPEDA

What allows applications to consume web services from the application, to expand its
capabilities? - ......ANSWER........approved APIs

,2 of 33


What allows users to make modifications that they choose to add or enhance the
functionality? - ......ANSWER........securing open-source software

What are 10 examples in threat modeling of common application vulnerabilities?
- ......ANSWER........Injection Broken Authentication Cross-Site Scripting (XSS) insecure
direct object access security misconfigurations sensitive data exposure missing function-
level access control cross-site request forgery (CSRF) using components with known
vulnerabilities invalidated redirects and forwards

What are 3 characteristics of cloud computing? - ......ANSWER........Elasticity, Simplicity
and Scalability

What are 3 countermeasures that can be applied to cloud operations against internal
threats? - ......ANSWER........DLP solutions financial penalties against the cloud
provider's personnel broad contractual protections

What are 3 data analytic modes? - ......ANSWER........Data Mining Agile business
intelligence real-time analytics

What are 3 dependencies that must be considered after cloud migration?
- ......ANSWER........The cloud provider's vendors, utilities, and suppliers

What are 3 examples that cloud provider would offer to enhance the customer's trust?
- ......ANSWER........Shared administration, SLAs, Audits

What are 3 federation standards? - ......ANSWER........WS-Federation OAuth OpenID
Connect

What are 3 risks associated with a community cloud? - ......ANSWER........Resiliency
through shared ownership Access and control lack of centralized standards

What are 3 risks associated with Infrastructure as a Service (Iaas)?
- ......ANSWER........Personnel threats External threats Lack of specific skillsets

What are 3 risks associated with Software as a service (SaaS)?
- ......ANSWER........Proprietary formats Virtualization Web application security

What are 3 things the provider will offer to address shared monitoring and testing
responsibilities in a cloud configuration? - ......ANSWER........SIM, SEIM, and SEM logs
DLP solution results Access to audit logs and performance data

,3 of 33


What are 4 cloud application assurance and validation methods?
- ......ANSWER........Approved APIs Secure code reviews runtime application self-
protection securing open-source software

What are 4 contracts that you should be familiar with? - ......ANSWER........service-level
agreements privacy-level agreements operational-level agreement payment card
industry data security standards contracts

What are 4 controls/mechanisms a cloud provider should play a role in in layered
defense? - ......ANSWER........Strong personnel controls, Technological controls, Physical
controls, Governance mechanisms

What are 4 examples of issues that developers and administrators must deal with?
- ......ANSWER........multitenancy third-party admins deployment models (Public,
Private, Community, Hybrid) service models (IaaS, PaaS, and SaaS)

What are 4 factors to consider avoiding vender lock-out? - ......ANSWER........Provider
longevity Core competency Jurisdictional suitability Supply chain dependencies
Legislative environment

What are 4 risks with virtualization? - ......ANSWER........Attacks on the hypervisor
Guest escape Information bleed Data seizure

What are 4 risks associated with Platform as a service (Paas)?
- ......ANSWER........Interoperability issues Persistent backdoors Virtualization Resource
Sharing

What are 4 risks in a multitenant environment? - ......ANSWER........Conflict of interest,
Privilege escalation, Information bleed, Legal activity

What are 4 things to consider avoiding vender lock-in? - ......ANSWER........Ensure
favorable contract terms for portability, Avoid proprietary formats, Ensure no physical
limitations to moving ,Check for regulatory constraints

What are 5 common cloud application deployment pitfalls? - ......ANSWER........On-
Premises Apps do not always transfer poor documentation not all apps are cloud ready
tenancy separation use of secure, validated APIs, possible data bleed

What are 5 examples of criticality for an org - ......ANSWER........Tangible assets,
Intangible assets, Processes, Data paths, Personnel

, 4 of 33


What are 5 examples of directory services? - ......ANSWER........X.500 LDAP Active
directory Novell eDirectory metadata and replication and synchronization

What are 5 items included in a BC/DR plan? - ......ANSWER........circumstances under
which an event or disaster is declared List of assets inventoried deemed critical actions,
tasks, and activities who is authorized to make the declaration essential points of
contact

What are 5 risks private cloud owners face? - ......ANSWER........Personnel threats
Natural disasters External attacks regulatory noncompliance malware

What are 5 things monitored in a data center? - ......ANSWER........OS
Logging ,Hardware, Network ,Temperature ,Humidity

What are 5 ways access management uses, to control access?
- ......ANSWER........authentication authorization policy management federation identity
repositories

What are 8 threats to a private cloud? - ......ANSWER........malware internal threats
external attackers man in the middle social engineering theft or loss of devices
regulatory violations natural disasters

What are all of access management resources stored in? - ......ANSWER........identity
repository directory

What are five examples of common supply chain risks? - ......ANSWER........financial
instability of provider single points of failure data breaches malware infestations data
loss

What are five examples of exceptions under copyright laws? - ......ANSWER........Fair use
satire library preservation personal backup versions for people with physical
disabilities

What are four examples of conflicts that are posed while employing DRM to the cloud?
- ......ANSWER........API Replication Jurisdiction Enterprise

What are four examples of Fair Use under copyright laws?
- ......ANSWER........Academic Critique News Reporting Scholarly Research
$22.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Janisewhite

Get to know the seller

Seller avatar
Janisewhite Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
3 months
Number of followers
0
Documents
121
Last sold
-
The Revision Lab

Welcome to the revision lab where we turn anxiety into absolute confidence. Think of us as your personal training ground. Our practice exams are the ultimate tool to test your understanding under realist conditions, helping you master the material and mindset needed to succeed. We offer topic specific bundles and detailed marking schemes. Are you are ready to experiment on success? Explore our revision materials and ace your revision materials.

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions