WGU COURSE C838 - MANAGING
CLOUD SECURITY QUIZLET BY BRIAN
MACFARLANE
J
Which phase of the cloud data life cycle allows both read and process functions to be performed?
A Create
B Archive
C Store
D Share - A
Which phase of the cloud data security life cycle typically occurs simultaneously with creation?
A Share
B Store
C Use
D Destroy - B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
,D Store - C
Which cloud data storage architecture allows sensitive data to be replaced with unique identification
symbols that retain all the essential information about the data without compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization - D
Which methodology could cloud data storage utilize to encrypt all data associated in an infrastructure as
a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption - D
There is a threat to a banking cloud platform service. The developer needs to provide inclusion in a
relational database that is seamless and readily searchable by search engine algorithms.
Which platform as a service (PaaS) data type should be used?
A Short-term storage
B Structured
C Unstructured
D Long-term storage - B
Which platform as a service (PaaS) storage architecture should be used if an organization wants to store
presentations, documents, and audio files?
A Relational database
B Block
C Distributed
,D Object - D
Which technique scrambles the content of data using a mathematical algorithm while keeping the
structural arrangement of the data?
A Dynamic masking
B Format-preserving encryption
C Proxy-based encryption
D Tokenization - B
Which encryption technique connects the instance to the encryption instance that handles all crypto
operations?
A Database
B Proxy
C Externally managed
D Server-side - B
Which type of control should be used to implement custom controls that safeguard data?
A Public and internal sharing
B Options for access
C Management plane
D Application level - D
Which element is protected by an encryption system?
A Ciphertext
B Management engine
C Data
D Public key - C
A cloud administrator recommends using tokenization as an alternative to protecting data without
encryption. The administrator needs to make an authorized application request to access the data.
, Which step should occur immediately before this action is taken?
A The tokenization server returns the token to the application.
B The tokenization server generates the token.
C The application collects a token.
D The application stores the token. - D
A company has recently defined classification levels for its data.
During which phase of the cloud data life cycle should this definition occur?
A Use
B Create
C Share
D Archive - B
Which jurisdictional data protection includes dealing with the international transfer of data?
A Financial modernization
B Secure choice authorization (SCA)
C Sarbanes-Oxley act (SOX)
D Privacy regulation - D
Which jurisdictional data protection controls the ways that financial institutions deal with the private
information of individuals?
A Stored communications act (SCA)
B Health insurance portability and accountability act (HIPAA)
C Gramm-Leach-Bliley act (GLBA)
D Sarbanes-Oxley act (SOX) - C
Which jurisdictional data protection safeguards protected health information (PHI)?
CLOUD SECURITY QUIZLET BY BRIAN
MACFARLANE
J
Which phase of the cloud data life cycle allows both read and process functions to be performed?
A Create
B Archive
C Store
D Share - A
Which phase of the cloud data security life cycle typically occurs simultaneously with creation?
A Share
B Store
C Use
D Destroy - B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
,D Store - C
Which cloud data storage architecture allows sensitive data to be replaced with unique identification
symbols that retain all the essential information about the data without compromising its security?
A Randomization
B Obfuscation
C Anonymization
D Tokenization - D
Which methodology could cloud data storage utilize to encrypt all data associated in an infrastructure as
a service (IaaS) deployment model?
A Sandbox encryption
B Polymorphic encryption
C Client-side encryption
D Whole-instance encryption - D
There is a threat to a banking cloud platform service. The developer needs to provide inclusion in a
relational database that is seamless and readily searchable by search engine algorithms.
Which platform as a service (PaaS) data type should be used?
A Short-term storage
B Structured
C Unstructured
D Long-term storage - B
Which platform as a service (PaaS) storage architecture should be used if an organization wants to store
presentations, documents, and audio files?
A Relational database
B Block
C Distributed
,D Object - D
Which technique scrambles the content of data using a mathematical algorithm while keeping the
structural arrangement of the data?
A Dynamic masking
B Format-preserving encryption
C Proxy-based encryption
D Tokenization - B
Which encryption technique connects the instance to the encryption instance that handles all crypto
operations?
A Database
B Proxy
C Externally managed
D Server-side - B
Which type of control should be used to implement custom controls that safeguard data?
A Public and internal sharing
B Options for access
C Management plane
D Application level - D
Which element is protected by an encryption system?
A Ciphertext
B Management engine
C Data
D Public key - C
A cloud administrator recommends using tokenization as an alternative to protecting data without
encryption. The administrator needs to make an authorized application request to access the data.
, Which step should occur immediately before this action is taken?
A The tokenization server returns the token to the application.
B The tokenization server generates the token.
C The application collects a token.
D The application stores the token. - D
A company has recently defined classification levels for its data.
During which phase of the cloud data life cycle should this definition occur?
A Use
B Create
C Share
D Archive - B
Which jurisdictional data protection includes dealing with the international transfer of data?
A Financial modernization
B Secure choice authorization (SCA)
C Sarbanes-Oxley act (SOX)
D Privacy regulation - D
Which jurisdictional data protection controls the ways that financial institutions deal with the private
information of individuals?
A Stored communications act (SCA)
B Health insurance portability and accountability act (HIPAA)
C Gramm-Leach-Bliley act (GLBA)
D Sarbanes-Oxley act (SOX) - C
Which jurisdictional data protection safeguards protected health information (PHI)?