Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam


427 Students Passed

95% Average Score

95% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Questions # 2:

Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?

Options:

A.

Baselining

B.

Patch management

C.

Deployment

D.

Capacity management

Questions # 3:

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

Options:

A.

Rapid scalability

B.

On-demand self-service

C.

Resource pooling

D.

Measured service

Questions # 4:

Which category of cloud service provides on-demand, self-service access to basic building blocks, such as virtualized servers, block storage, and networking capacity, that can be used to create custom IT solutions?

Options:

A.

Networking as a service (NaaS)

B.

Platform as a service (PaaS)

C.

Software as a service (SaaS)

D.

Infrastructure as a service (IaaS)

Questions # 5:

Which device is used to create and manage encryption keys used for data transmission in a cloud-based environment?

Options:

A.

Hardware security module (HSM)

B.

Memory controller

C.

RAID controller

D.

Trusted platform module (TPM)

Questions # 6:

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

Options:

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Questions # 7:

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Questions # 8:

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation

B.

Physical destruction

C.

Overwriting

D.

Degaussing

Questions # 9:

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.

Authorization

B.

Web application firewall (WAF)

C.

Antispyware program

D.

Authentication

Questions # 10:

As part of an e-discovery process, an employee needs to identify all documents that contain a specific phrase. Which type of discovery method should the employee use to identify these documents?

Options:

A.

Location-based

B.

Content-based

C.

Label-based

D.

Metadata-based

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.