WGU C838 MANAGING CLOUD SECURITY (2025)
COMPLETE EXAM PREP | UPDATED & TEST BANK
VERIFIED QUESTIONS AND ANSWERS GRADED A+
Which phase of the cloud data life cycle allows both read and process functions to be
performed?
A Create
B Archive
C Store
D Share
A
Which phase of the cloud data security life cycle typically occurs simultaneously with
creation?
A Share
B Store
C Use
D Destroy
B
Which phase of the cloud data life cycle uses content delivery networks?
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
,MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
A Destroy
B Archive
C Share
D Create
C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store
C
Which cloud data storage architecture allows sensitive data to be replaced with unique
identification symbols that retain all the essential information about the data without
compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization
D
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
,MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
Which methodology could cloud data storage utilize to encrypt all data associated in an
infrastructure as a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption
D
How often should the CMB meet?
A Every week
B Often enough to address organizational needs and attenuate frustration with delay
C Whenever regulations dictate
D Annually
B
The CMB should include representations from all of the following offices except:
A Regulators
B Management
C Security office
D IT department
A
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE
, MINDPLUG SOLUTIONS — EMPOWERING MINDS, BUILDING FUTURES
Deviations from the baseline should be investigated and ________.
A Revealed
B Encouraged
C Documented
D Enforced
C
Maintenance mode requires all of these actions except:
A Remove all active production instances
B Initiate enhanced security controls
C Prevent new logins
D Ensure logging continues
B
For performance purposes, OS monitoring should include all of the following except:
A Print spooling
B Disk space
C Disk I/O usage
D CPU usage
A
EDUCATIONAL SUPPORT • ACADEMIC RESOURCES • PROFESSIONAL GUIDANCE