100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU C838 – MANAGING CLOUD SECURITY EXAM QUESTIONS AND ANSWERS

Puntuación
-
Vendido
-
Páginas
33
Grado
A+
Subido en
29-10-2025
Escrito en
2025/2026

WGU C838 – MANAGING CLOUD SECURITY EXAM QUESTIONS AND ANSWERS

Institución
WGU C838
Grado
WGU C838











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU C838
Grado
WGU C838

Información del documento

Subido en
29 de octubre de 2025
Número de páginas
33
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU C838 – MANAGING CLOUD SECURITY
EXAM QUESTIONS AND ANSWERS
What are the 4 characteristics of cloud computing? - ANSWER-Broad network access
On-demand services
Resource Pooling
Measured or "metered" service

What NIST publication number defines cloud computing? - ANSWER-800-145

What ISO/IEC standard provides information on cloud computing? - ANSWER-17788

What is another way of describing a functional business requirement? - ANSWER-
necessary

What is another way of describing a nonfunctional business requirement? - ANSWER-
not necessary

What is the greatest driver pushing orgs to the cloud? - ANSWER-Cost savings

What is cloud bursting? - ANSWER-Ability to increase available cloud resources on
demand

What are 3 characteristics of cloud computing? - ANSWER-Elasticity
Simplicity
Scalability

What is a cloud customer? - ANSWER-Anyone purchasing cloud services

What is a cloud user? - ANSWER-Anyone using cloud services

What are the three cloud computing service models? - ANSWER-SaaS(Software as a
service)
PaaS(Platform as a service)
IaaS(Infrastructure as a service)

What is IaaS (Infrastructure as a Service)? - ANSWER-Cloud provider provides all the
physical capability and administration, while the customer is responsible for logical
resources.

What is PaaS (Platform as a Service)? - ANSWER-A cloud computing service that
provides the hardware and the operating system and is responsible for updating and
maintaining both.

,What is SaaS (Software As A Service)? - ANSWER-Cloud provider manages
everything.

What are the four cloud deployment models? - ANSWER-Public
Private
Community
Hybrid

What cloud model is owned by a single organization? - ANSWER-Private

What cloud model is an arrangement of two or more cloud servers? - ANSWER-Hybrid

What cloud model is a shared setup between orgs? - ANSWER-Community

What cloud model is open for free usage? - ANSWER-Public

What is a cloud service provider? - ANSWER-Cloud service provider manages and
provides entire hosting ability

What is a Cloud Access Security Broker? - ANSWER-Third-party acting as an
intermediary for identity and access management

What do regulators do? - ANSWER-Ensure organizations are in compliance with
regulatory framework.

What word in the CIA triad describes: What protects information from unauthorized
access/dissemination? - ANSWER-Confidentiality

What word in the CIA triad describes: Ensuring that information is not subject to
unauthorized modification? - ANSWER-Integrity

What word in the CIA triad describes: Ensuring that authorized users can access the
information when they are permitted to do so? - ANSWER-Availability

What is a cloud architect? - ANSWER-Expert in cloud computing

What is cloud os also known as? - ANSWER-PaaS

NIST standard number that lists accredited and outmoded cryptosystems - ANSWER-
FIPS 140-2

customer may be unable to leave, migrate, or transfer to an alternate provider due to
technical or non-technical constraints. - ANSWER-vendor lock-m

What is cloud migration? - ANSWER-Process of transitioning part of a company's data
or services from onsite premises to the cloud

,What is cloud portability? - ANSWER-Move applications and data between cloud
providers

What offers a degree of assurance that nobody w/o authorization will be able to access
other's data? - ANSWER-Encryption

If a cloud customer wants a secure, isolated sandbox in order to conduct software
development and testing, which cloud service model would probably be best? -
ANSWER-PaaS

What technology has NOT made cloud service viable? - ANSWER-Smart hubs

What determines the critical paths, processes, and assets of an organization? -
ANSWER-BIA

Fully-operational environment with very little maintenance or administration necessary,
which cloud service model would probably be best? - ANSWER-PaaS

customer is unable to recover or access their own data due to the cloud provider going
into bankruptcy or otherwise leaving the market. - ANSWER-Vendor lock-out

What are four examples of things to know to decide how to handle risks within an org? -
ANSWER-Inventory of all assets
Valuation of each asset
Critical paths, processes, and assets
Clear understanding of risk appetite

T/F: Assets are only tangible items. - ANSWER-False. Assets are everything owned or
controlled by an org.

The process of evaluating assets? - ANSWER-Business Impact Analysis(BIA)

What is criticality? - ANSWER-Something an org could not operate or exist without

What are 5 examples of criticality for an org - ANSWER-Tangible assets
Intangible assets
Processes
Data paths
Personnel

In risk, what is the avoidance method? - ANSWER-Avoiding high risk

In risk, what is the acceptance method? - ANSWER-Acceptable level of risk

In risk, what is an example of the avoidance method? - ANSWER-Insurance

, In risk, what is the mitigation method? - ANSWER-Controls or countermeasures

Assets can be what? - ANSWER-Tangible
Intangible
Personnel

What does Business Impact Analysis do? - ANSWER-Defines which of the assets
provide the intrinsic value of an organization.

What is risk appetite - ANSWER-Level, Amount, or Type of risk that an org finds
acceptable

What is the IaaS boundary? - ANSWER-The provider is responsible for connectivity and
power and the customer is in charge for installation of software.

What is the PaaS boundary? - ANSWER-The provider is responsible for updates and
administration of the OS and the customer monitors and reviews software events.

What is the SaaS boundary? - ANSWER-The provider is responsible for system
maintenance and the customer supplies and processes data to and in the system.

What should encryption be used for in a cloud datacenter? - ANSWER-Long-term
storage/archiving
Protecting near-term stored files, such as snapshots of virtualized instances
Preventing unauthorized access to specific datasets by authorized personnel

What should encryption be used for in communications between cloud providers and
users? - ANSWER-Creating secure sessions
Ensuring the integrity and confidentiality of data in transit

What are 4 controls/mechanisms a cloud provider should play a role in in layered
defense? - ANSWER-Strong personnel controls
Technological controls
Physical controls
Governance mechanisms

In cloud layered defense what are examples of personnel controls? - ANSWER-
background checks
continual monitoring

In cloud layered defense what are examples of technological controls? - ANSWER-
encryption
event logging
access control enforcement
$12.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
LeeErickson

Conoce al vendedor

Seller avatar
LeeErickson Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
8 meses
Número de seguidores
0
Documentos
1454
Última venta
2 meses hace

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes