WGU COURSE C838 MANAGING CLOUD
SECURITY (CCSP) EXAM QUESTIONS LATEST
2025/2026 ALL VERSIONS WITH CORRECT
ANSWERS BEST QUALITY EXAM
Who retains final ownership for granting data access and permissions in a shared
responsibility model?
A Customer
B Developer
C Manager
D Analyst -- ANSWER--A
Which data retention solution should be applied to a file in order to reduce the data footprint
by deleting fixed content and duplicate data?
A Backup
B Caching
C Archiving
D Saving -- ANSWER--C
Which data retention method is stored with a minimal amount of metadata storage with the
content?
A File system
B Redundant array
C Object-based
D Block-based -- ANSWER--D
, 2
What is a key capability of security information and event management?
A Intrusion prevention capabilities
B Automatic remediation of issues
C Centralized collection of log data
D Secure remote access -- ANSWER--C
Which data source provides auditability and traceability for event investigation as well as
documentation?
A Storage files
B Packet capture
C Network interference
D Database tables -- ANSWER--B
Which data source provides auditability and traceability for event investigation as well as
documentation?
A Network segmentation
B Ephemeral storage
C Database schema
D Virtualization platform logs -- ANSWER--D
Which technology is used to manage identity access management by building trust
relationships between organizations?
A Single sign-on
B Multifactor authentication
C Federation
D Biometric authentication -- ANSWER--C
, 3
Which term describes the action of confirming identity access to an information system?
A Coordination
B Concept
C Access
D Authentication -- ANSWER--D
Which cloud computing tool is used to discover internal use of cloud services using various
mechanisms such as network monitoring?
A Data loss prevention (DLP)
B Content delivery network (CDN)
C Cloud access security broker (CASB)
D Web application firewall (WAF) -- ANSWER--C
Which cloud computing technology unlocks business value through digital and physical
access to maps?
A Multitenancy
B Cloud application
C Application programming interface
D On-demand self-service -- ANSWER--C
Which cloud computing tool may help detect data migrations to cloud services?
A Uniform resource locator (URL) filtering
B Cloud security gateways
C Cloud data transfer
D Data loss prevention -- ANSWER--D
What is a key component of the infrastructure as a service (IaaS) cloud service model?
, 4
A Allows choice and reduces lock-in
B Supports multiple languages and frameworks
C Ease of use and limited administration
D High reliability and resilience -- ANSWER--D
Which phase of the cloud data life cycle allows both read and process functions to be
performed?
A Create
B Archive
C Store
D Share -- ANSWER--A
Which phase of the cloud data security life cycle typically occurs simultaneously with
creation?
A Share
B Store
C Use
D Destroy -- ANSWER--B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create -- ANSWER--C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use