100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |AGRADE 1)

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
17-12-2023
Geschreven in
2023/2024

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |AGRADE 1) You are the security subject matter expert (SME) for an organization considering atransitionfrom thelegacyenvironment intoahostedcloudprovider's data center. One of the challenges you 're facing is whether the cloud provider will be able to comply with the existing legislative and contractual frameworks yourorganization is requiredto follow.This is a issue. 2.Youare thesecuritysubject matterexpert (SME) foranorganizationconsideringa transition from the legacyenviron ment intoahosted cloudprovider 'sdata center. One of the challenges you 're facing is whether the cloud provider will be able to allow your organization to substantiate and determine with some assurance thatallof the contract terms are being met. This is a(n) issue. ulatory 3.Encryption is anessential tool foraffordingsecurity tocloud-basedoperations. While it is possible toencrypteverysystem,piece ofdata,and transactionthat takesplace onthe cloud, why might thatnotbe theoptimum choice foran organization? a.Key length variances don'tprovideanyactualadditionalsecurity. b. It would causeadditionalprocessingoverheadandtimedelay. a. Resiliency b. Privacy c. Performance d. Regulatory - ANSWER- D d. Encryption has to be maintained. - ANSWER- B c. User tracking is essential to performance. c. It might result in vendor lockout. d. The datasubjects might beupsetby this. - ANSWER- B 4.Encryption is anessential tool foraffordingsecuritytocloud-basedoperations. While it is possible toencrypteverysystem,piece ofdata,and transactiontha takesplace onthe cloud, why might thatnotbe theoptimum choice foran organization? a. It could increasethepossibility ofphysical theft. b.Encryption won 't work throughout theenvironment. c.Theprotection mightbedisproportionate tothe value of theasset(s). d. Users will be abletoseeeverything withintheorganization. - ANSWER- C 5. Whichof the following is notanelementof the identificationcomponentof identityandaccess management (IAM)? a. Provisioning b. Management c. Discretion d. Deprovisioning - ANSWER- C 6. Whichof the followingentities is most likely toplayavital role in the identity provisioningaspectofauser 's experience inanorganization? a. Theaccountingdepartment b. Thehumanresources (HR) office c. The maintenance team d. The purchasing office - ANSWER- B 7. Why is thedeprovisioningelementof the identificationcomponentof identityand access management (IAM) so important? a. Extra accounts cost so much extra money. b. Openbutunassignedaccounts arevulnerabilities. 8. Allof the followingare reasons toperform review and maintenanceactionsonuseraccounts except . a. Todetermine whether theuserstill needs thesameaccess c. The bank branch being used by d. Privileged users can cause more damage to the organization. - ANSWER- D c. There are extra controls on privileged user accounts. c. More frequent reviews of the necessity for access b. Review of personal financial accounts for privileged users 12. The additional review activities that might be performed for privileged user accounts could include all of the following except . a. Deeper personnel background checks b. Todetermine whether theuser is still withtheorganization c. Todetermine whether thedata set isstill applicable totheuser 's role d. Todetermine whether theuser is still performing well - ANSWER- D 9. Whoshouldbe involved inreview and maintenanceofuseraccounts/access? a. The user 's manager b.Thesecurity manager c. Theaccountingdepartment d. The incident responseteam - ANSWER- A 10. Which of the followingprotocols is mostapplicabletothe identification process aspectof identityand access management (IAM)? a. Secure Sockets Layer (SSL) b. Internet Protocolsecurity (IPsec) c.Lightweight Directory Access Protocol (LDAP) d. Amorphous ancillarydatatransmission (AADT) - ANSWER- C

Meer zien Lees minder
Instelling
WGU C838 MANAGING CLOUD SECURITY
Vak
WGU C838 MANAGING CLOUD SECURITY











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU C838 MANAGING CLOUD SECURITY
Vak
WGU C838 MANAGING CLOUD SECURITY

Documentinformatie

Geüpload op
17 december 2023
Aantal pagina's
36
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€22,82
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
kelvinmwanjiru

Maak kennis met de verkoper

Seller avatar
kelvinmwanjiru Chamberlain School Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
2 jaar
Aantal volgers
0
Documenten
124
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen