Which phase of the cloud data life cycle allows A
both read and process functions to be
performed?
A Create
B Archive
C Store
D Share
Which phase of the cloud data security life cycle B
typically occurs simultaneously with creation?
A Share
B Store
C Use
D Destroy
Which phase of the cloud data life cycle uses C
content delivery networks?
A Destroy
B Archive
C Share
D Create
Page 1 WGU Course C838 - Managing Cloud Security (CCSP).pdf
,WGU Course C838 - Managing Cloud Security (CCSP) WGU Course C838 - Managing Cloud Security (CCSP) 2/18/2026
Which phase of the cloud data life cycle is C
associated with crypto-shredding?
A Share
B Use
C Destroy
D Store
Which cloud data storage architecture allows D
sensitive data to be replaced with unique
identification symbols that retain all the essential
information about the data without
compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization
Page 2 WGU Course C838 - Managing Cloud Security (CCSP).pdf
,WGU Course C838 - Managing Cloud Security (CCSP) WGU Course C838 - Managing Cloud Security (CCSP) 2/18/2026
Which methodology could cloud data storage D
utilize to encrypt all data associated in an
infrastructure as a service (IaaS) deployment
model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption
There is a threat to a banking cloud platform B
service. The developer needs to provide
inclusion in a relational database that is seamless
and readily searchable by search engine
algorithms.
Which platform as a service (PaaS) data type
should be used?
A Short-term storage
B Structured
C Unstructured
D Long-term storage
Page 3 WGU Course C838 - Managing Cloud Security (CCSP).pdf
, WGU Course C838 - Managing Cloud Security (CCSP) WGU Course C838 - Managing Cloud Security (CCSP) 2/18/2026
Which platform as a service (PaaS) storage D
architecture should be used if an organization
wants to store presentations, documents, and
audio files?
A Relational database
B Block
C Distributed
D Object
Which technique scrambles the content of data B
using a mathematical algorithm while keeping
the structural arrangement of the data?
A Dynamic masking
B Format-preserving encryption
C Proxy-based encryption
D Tokenization
Page 4 WGU Course C838 - Managing Cloud Security (CCSP).pdf