Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

WGU Managing-Cloud-Security WGU Managing Cloud Security (JY02) Exam Practice Test

WGU Managing Cloud Security (JY02) Questions and Answers

Question 1

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

Options:

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Question 2

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

Options:

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Question 3

Which phase of software design covers the combination of individual components of developed code and the determination of proper interoperability?

Options:

A.

Testing

B.

Training

C.

Planning

D.

Coding

Question 4

When should a cloud service provider delete customer data?

Options:

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

Question 5

Which platform component includes containers and storage?

Options:

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Question 6

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

Options:

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Question 7

What is the process of identifying and procuring stored data as evidence for legal purposes?

Options:

A.

Chain of custody

B.

Forensic imaging

C.

Electronic discovery

D.

Gap analysis

Question 8

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Question 9

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Question 10

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.

It should ensure it has the correct type of license.

B.

It should ensure it has the correct location to store licenses.

C.

It should ensure it only uses closed-source licenses.

D.

It should ensure it only uses open-source licenses.

Question 11

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Question 12

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

Options:

A.

Software development

B.

Procurement

C.

Quality assurance

D.

Marketing

Question 13

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

Options:

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Question 14

Which activity is within the scope of the cloud provider’s role in the chain of custody?

Options:

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Question 15

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Question 16

Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?

Options:

A.

Store

B.

Use

C.

Destroy

D.

Create

Question 17

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

Options:

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Question 18

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Question 19

An organization is planning for an upcoming Payment Card Industry Data Security Standard (PCI DSS) audit and wants to ensure that only relevant files are included in the audit materials. Which process should the organization use to ensure that the relevant files are identified?

Options:

A.

Normalization

B.

Tokenization

C.

Categorization

D.

Anonymization

Question 20

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Access control list (ACL)

D.

Authentication

Question 21

An internal developer deploys a new customer information system at a company. The system has an updated graphical interface with new fields. Which type of functional testing ensures that the graphical interface used by employees to input customer data behaves as the employees need it to?

Options:

A.

Load testing

B.

Regression testing

C.

Security testing

D.

Acceptance testing

Question 22

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

Options:

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Question 23

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Question 24

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board