WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OBJECTIVE
ASSESSMENT / WGU C838 OA PREPARATION/WGU C838 OA
PRACTICE WITH COMPLETE 120 QUESTIONS AND ANSWERS LATEST
2025/2026 |A+GRADE
Which jurisdictional data protection safeguards protected health information (PHI)?
Directive 95/46/EC
Safe harbor regime
Personal Data Protection Act of 2000
Health Insurance Portability and Accountability Act (HIPAA) - ......ANSWER........Health
Insurance Portability and Accountability Act (HIPAA)
How is the compliance of the cloud service provider's legal and regulatory requirements
verified when securing personally identifiable information (PII) data in the cloud?
E-discovery process
Contractual agreements
Researching data retention laws
Third-party audits and attestations - ......ANSWER........Third-party audits and attestations
Which security strategy is associated with data rights management solutions?
Static policy control
Continuous auditing
Unrestricted replication
Limited documents type support - ......ANSWER........Continuous auditing
Who retains final ownership for granting data access and permissions in a shared
responsibility model?
,2 of 33
Analyst
Manager
Customer
Developer - ......ANSWER........Customer
Which data retention solution should be applied to a file to reduce the data footprint by
deleting fixed content and duplicate data?
Saving
Backup
Caching
Archiving - ......ANSWER........Archiving
Which data retention method is stored with a minimal amount of metadata storage with
the content?
File system
Redundant array
Block-based
Object-based - ......ANSWER........Block-based
What is a key capability of security information and event management?
Secure remote access
Intrusion prevention capabilities
Automatic remediation of issues
Centralized collection of log data - ......ANSWER........Centralized collection of log data
Which data source provides auditability and traceability for event investigation as well as
documentation?
,3 of 33
Storage files
Packet capture
Database tables
Network interference - ......ANSWER........Packet capture
Which data source provides auditability and traceability for event investigation as well as
documentation?
Database schema
Ephemeral storage
Network segmentation
Virtualization platform logs - ......ANSWER........Virtualization platform logs
Which technology is used to manage identity access management by building trust
relationships between organizations?
Federation
Single sign-on
Biometric authentication
Multifactor authentication - ......ANSWER........Federation
Which term describes the action of confirming identity access to an information system?
Access
Concept
Coordination
Authentication - ......ANSWER........Authentication
Which cloud computing tool is used to discover internal use of cloud services using
various mechanisms such as network monitoring?
, 4 of 33
Data loss prevention (DLP)
Web application firewall (WAF)
Content delivery network (CDN)
Cloud access security broker (CASB) - ......ANSWER........Cloud access security broker
(CASB)
Which cloud computing technology unlocks business value through digital and physical
access to maps?
Multitenancy
Cloud application
On-demand self-service
Application programming interface - ......ANSWER........Application programming interface
Which cloud computing tool may help detect data migrations to cloud services?
Cloud data transfer
Data loss prevention
Cloud security gateways
Uniform resource locator (URL) filtering - ......ANSWER........Data loss prevention
What is a key component of the infrastructure as a service (IaaS) cloud service model?
High reliability and resilience
Allows choice and reduces lock-in
Ease of use and limited administration
Supports multiple languages and frameworks - ......ANSWER........High reliability and
resilience
What is a key capability of infrastructure as a service (IaaS)?