Science Computer Science Computer Security and Reliability Save
D320 - Managing Cloud Security
31 studiers today 4.8 (15 reviews)
Students also studied
Flashcard sets Study guides
D320 (C838) Laws, Regulations, and ... WGU Course C838 - Managing Clou... Security+ Exam Prep Module 1 Threat
105 terms 1,037 terms 12 terms Teacher
wgu0408 Preview WieldyStone2 Preview Rfernandez75 Preview Vic
Terms in this set (701)
Which phase of the cloud data life cycle B
requires adherence to export and import
restrictions, including Export Administration
Regulations (EAR) and the Wassenaar
Arrangement?
A) Create
B) Share
C) Use
D) Destroy
Why is the striping method of storing data D
used in most redundant array of
independent disks (RAID) configurations?
A) It prevents outages and attacks from
occurring in a cloud environment.
B) It prevents data from being recovered
once it is destroyed using crypto-
shredding.
C) It allows data to be safely distributed
and stored in a common centralized
location.
D) It allows efficient data recovery as even
if one drive fails, other drives fill in the
missing data.
,What is the purpose of egress monitoring B
tools?
A) They are used to convert a given set of
data or information into a different value.
B) They are used to prevent data from
going outside the control of an
organization.
C) They are used to create data during the
Create phase of the cloud data life cycle.
D) They are used to remove data during the
Destroy phase of the cloud data life cycle.
A company is looking at different types of D
cloud storage options. One of the threats
to cloud storage that the company
foresees is the possibility of losing forensic
artifacts in the event of an incident
response investigation.
Which type of cloud storage has the
highest risk of losing forensic artifacts in
the event of an incident response
investigation?
A) File-based
B) Long-term
C) Block
D) Ephemeral
A manager is made aware of a customer C
complaint about how an application
developed by the company collects
personal and environmental information
from the devices it is installed on.
Which document should the manager refer
to in order to determine if the company has
properly disclosed information about what
data it collects from this application's
users?
A) Retention policy
B) Breach notification
C) Privacy notice
D) Denial of service
An organization needs to store passwords B
in a database securely. The data should not
be available to system administrators.
Which technique should the organization
use?
A) Encryption
B) Hashing
C) Encoding
D) Masking
, A company is looking to ensure that the C
names of individuals in its data in the cloud
are not revealed in the event of a data
breach, as the data is sensitive and
classified.
Which data masking technique should the
company use to prevent attackers from
identifying individuals in the event of a data
breach?
A) Crypto-shredding
B) Degaussing
C) Anonymization
D) Randomization
An organization needs to quickly identify A
the document owner in a shared network
folder.
Which technique should the organization
use to meet this goal?
A) Labeling
B) Classification
C) Mapping
D) Categorization
An organization plans to introduce a new A
data standard and wants to ensure that
system inventory data will be efficiently
discovered and processed.
Which type of data should the organization
use to meet this goal?
A) Structured
B) Semi-structured
C) Annotated
D) Mapped
An organization implemented an C
information rights management (IRM)
solution to prevent critical data from being
copied without permission and a cloud
backup solution to ensure that the critical
data is protected from storage failures.
Which IRM challenge will the organization
need to address?
A) Jurisdictional conflicts
B) Agent conflicts
C) Replication restrictions
D) Execution restrictions
D320 - Managing Cloud Security
31 studiers today 4.8 (15 reviews)
Students also studied
Flashcard sets Study guides
D320 (C838) Laws, Regulations, and ... WGU Course C838 - Managing Clou... Security+ Exam Prep Module 1 Threat
105 terms 1,037 terms 12 terms Teacher
wgu0408 Preview WieldyStone2 Preview Rfernandez75 Preview Vic
Terms in this set (701)
Which phase of the cloud data life cycle B
requires adherence to export and import
restrictions, including Export Administration
Regulations (EAR) and the Wassenaar
Arrangement?
A) Create
B) Share
C) Use
D) Destroy
Why is the striping method of storing data D
used in most redundant array of
independent disks (RAID) configurations?
A) It prevents outages and attacks from
occurring in a cloud environment.
B) It prevents data from being recovered
once it is destroyed using crypto-
shredding.
C) It allows data to be safely distributed
and stored in a common centralized
location.
D) It allows efficient data recovery as even
if one drive fails, other drives fill in the
missing data.
,What is the purpose of egress monitoring B
tools?
A) They are used to convert a given set of
data or information into a different value.
B) They are used to prevent data from
going outside the control of an
organization.
C) They are used to create data during the
Create phase of the cloud data life cycle.
D) They are used to remove data during the
Destroy phase of the cloud data life cycle.
A company is looking at different types of D
cloud storage options. One of the threats
to cloud storage that the company
foresees is the possibility of losing forensic
artifacts in the event of an incident
response investigation.
Which type of cloud storage has the
highest risk of losing forensic artifacts in
the event of an incident response
investigation?
A) File-based
B) Long-term
C) Block
D) Ephemeral
A manager is made aware of a customer C
complaint about how an application
developed by the company collects
personal and environmental information
from the devices it is installed on.
Which document should the manager refer
to in order to determine if the company has
properly disclosed information about what
data it collects from this application's
users?
A) Retention policy
B) Breach notification
C) Privacy notice
D) Denial of service
An organization needs to store passwords B
in a database securely. The data should not
be available to system administrators.
Which technique should the organization
use?
A) Encryption
B) Hashing
C) Encoding
D) Masking
, A company is looking to ensure that the C
names of individuals in its data in the cloud
are not revealed in the event of a data
breach, as the data is sensitive and
classified.
Which data masking technique should the
company use to prevent attackers from
identifying individuals in the event of a data
breach?
A) Crypto-shredding
B) Degaussing
C) Anonymization
D) Randomization
An organization needs to quickly identify A
the document owner in a shared network
folder.
Which technique should the organization
use to meet this goal?
A) Labeling
B) Classification
C) Mapping
D) Categorization
An organization plans to introduce a new A
data standard and wants to ensure that
system inventory data will be efficiently
discovered and processed.
Which type of data should the organization
use to meet this goal?
A) Structured
B) Semi-structured
C) Annotated
D) Mapped
An organization implemented an C
information rights management (IRM)
solution to prevent critical data from being
copied without permission and a cloud
backup solution to ensure that the critical
data is protected from storage failures.
Which IRM challenge will the organization
need to address?
A) Jurisdictional conflicts
B) Agent conflicts
C) Replication restrictions
D) Execution restrictions