WGU Course C838 - Managing Cloud Security (CCSP)
Exam Questions With Correct Answers
Which |phase |of |the |cloud |data |life |cycle |allows |both |read |and |process |functions |to |be |
performed?
|
A |Create
B |Archive
C |Store
D |Share |- |CORRECT |ANSWER✔✔-A
Which |phase |of |the |cloud |data |security |life |cycle |typically |occurs |simultaneously |with |
creation?
|
A |Share
B |Store
C |Use
D |Destroy |- |CORRECT |ANSWER✔✔-B
Which |phase |of |the |cloud |data |life |cycle |uses |content |delivery |networks?
A |Destroy
B |Archive
C |Share
D |Create |- |CORRECT |ANSWER✔✔-C
,Which |phase |of |the |cloud |data |life |cycle |is |associated |with |crypto-shredding?
A |Share
B |Use
C |Destroy
D |Store |- |CORRECT |ANSWER✔✔-C
Which |cloud |data |storage |architecture |allows |sensitive |data |to |be |replaced |with |unique |
identification |symbols |that |retain |all |the |essential |information |about |the |data |without |
compromising |its |security?
|
A |Randomization
B |Obfuscation
C |Anonymization
D |Tokenization |- |CORRECT |ANSWER✔✔-D
Which |methodology |could |cloud |data |storage |utilize |to |encrypt |all |data |associated |in |an |
infrastructure |as |a |service |(IaaS) |deployment |model?
|
A |Sandbox |encryption
B |Polymorphic |encryption
C |Client-side |encryption
D |Whole-instance |encryption |- |CORRECT |ANSWER✔✔-D
There |is |a |threat |to |a |banking |cloud |platform |service. |The |developer |needs |to |provide |
inclusion |in |a |relational |database |that |is |seamless |and |readily |searchable |by |search |engine |
algorithms.
|
Which |platform |as |a |service |(PaaS) |data |type |should |be |used?
,|
A |Short-term |storage
B |Structured
C |Unstructured
D |Long-term |storage |- |CORRECT |ANSWER✔✔-B
Which |platform |as |a |service |(PaaS) |storage |architecture |should |be |used |if |an |organization |
wants |to |store |presentations, |documents, |and |audio |files?
|
A |Relational |database
B |Block
C |Distributed
D |Object |- |CORRECT |ANSWER✔✔-D
Which |technique |scrambles |the |content |of |data |using |a |mathematical |algorithm |while |keeping
|the |structural |arrangement |of |the |data?
|
A |Dynamic |masking
B |Format-preserving |encryption
C |Proxy-based |encryption
D |Tokenization |- |CORRECT |ANSWER✔✔-B
Which |encryption |technique |connects |the |instance |to |the |encryption |instance |that |handles |all |
crypto |operations?
|
A |Database
B |Proxy
C |Externally |managed
D |Server-side |- |CORRECT |ANSWER✔✔-B
, Which |type |of |control |should |be |used |to |implement |custom |controls |that |safeguard |data?
|
A |Public |and |internal |sharing
B |Options |for |access
C |Management |plane
D |Application |level |- |CORRECT |ANSWER✔✔-D
Which |element |is |protected |by |an |encryption |system?
|
A |Ciphertext
B |Management |engine
C |Data
D |Public |key |- |CORRECT |ANSWER✔✔-C
A |cloud |administrator |recommends |using |tokenization |as |an |alternative |to |protecting |data |
without |encryption. |The |administrator |needs |to |make |an |authorized |application |request |to |
access |the |data.
|
Which |step |should |occur |immediately |before |this |action |is |taken?
|
A |The |tokenization |server |returns |the |token |to |the |application.
B |The |tokenization |server |generates |the |token.
C |The |application |collects |a |token.
D |The |application |stores |the |token. |- |CORRECT |ANSWER✔✔-D
A |company |has |recently |defined |classification |levels |for |its |data.
|
During |which |phase |of |the |cloud |data |life |cycle |should |this |definition |occur?
Exam Questions With Correct Answers
Which |phase |of |the |cloud |data |life |cycle |allows |both |read |and |process |functions |to |be |
performed?
|
A |Create
B |Archive
C |Store
D |Share |- |CORRECT |ANSWER✔✔-A
Which |phase |of |the |cloud |data |security |life |cycle |typically |occurs |simultaneously |with |
creation?
|
A |Share
B |Store
C |Use
D |Destroy |- |CORRECT |ANSWER✔✔-B
Which |phase |of |the |cloud |data |life |cycle |uses |content |delivery |networks?
A |Destroy
B |Archive
C |Share
D |Create |- |CORRECT |ANSWER✔✔-C
,Which |phase |of |the |cloud |data |life |cycle |is |associated |with |crypto-shredding?
A |Share
B |Use
C |Destroy
D |Store |- |CORRECT |ANSWER✔✔-C
Which |cloud |data |storage |architecture |allows |sensitive |data |to |be |replaced |with |unique |
identification |symbols |that |retain |all |the |essential |information |about |the |data |without |
compromising |its |security?
|
A |Randomization
B |Obfuscation
C |Anonymization
D |Tokenization |- |CORRECT |ANSWER✔✔-D
Which |methodology |could |cloud |data |storage |utilize |to |encrypt |all |data |associated |in |an |
infrastructure |as |a |service |(IaaS) |deployment |model?
|
A |Sandbox |encryption
B |Polymorphic |encryption
C |Client-side |encryption
D |Whole-instance |encryption |- |CORRECT |ANSWER✔✔-D
There |is |a |threat |to |a |banking |cloud |platform |service. |The |developer |needs |to |provide |
inclusion |in |a |relational |database |that |is |seamless |and |readily |searchable |by |search |engine |
algorithms.
|
Which |platform |as |a |service |(PaaS) |data |type |should |be |used?
,|
A |Short-term |storage
B |Structured
C |Unstructured
D |Long-term |storage |- |CORRECT |ANSWER✔✔-B
Which |platform |as |a |service |(PaaS) |storage |architecture |should |be |used |if |an |organization |
wants |to |store |presentations, |documents, |and |audio |files?
|
A |Relational |database
B |Block
C |Distributed
D |Object |- |CORRECT |ANSWER✔✔-D
Which |technique |scrambles |the |content |of |data |using |a |mathematical |algorithm |while |keeping
|the |structural |arrangement |of |the |data?
|
A |Dynamic |masking
B |Format-preserving |encryption
C |Proxy-based |encryption
D |Tokenization |- |CORRECT |ANSWER✔✔-B
Which |encryption |technique |connects |the |instance |to |the |encryption |instance |that |handles |all |
crypto |operations?
|
A |Database
B |Proxy
C |Externally |managed
D |Server-side |- |CORRECT |ANSWER✔✔-B
, Which |type |of |control |should |be |used |to |implement |custom |controls |that |safeguard |data?
|
A |Public |and |internal |sharing
B |Options |for |access
C |Management |plane
D |Application |level |- |CORRECT |ANSWER✔✔-D
Which |element |is |protected |by |an |encryption |system?
|
A |Ciphertext
B |Management |engine
C |Data
D |Public |key |- |CORRECT |ANSWER✔✔-C
A |cloud |administrator |recommends |using |tokenization |as |an |alternative |to |protecting |data |
without |encryption. |The |administrator |needs |to |make |an |authorized |application |request |to |
access |the |data.
|
Which |step |should |occur |immediately |before |this |action |is |taken?
|
A |The |tokenization |server |returns |the |token |to |the |application.
B |The |tokenization |server |generates |the |token.
C |The |application |collects |a |token.
D |The |application |stores |the |token. |- |CORRECT |ANSWER✔✔-D
A |company |has |recently |defined |classification |levels |for |its |data.
|
During |which |phase |of |the |cloud |data |life |cycle |should |this |definition |occur?