Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam


721 Students Passed

88% Average Score

92% Same Questions
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which platform component includes containers and storage?

Options:

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Questions # 12:

An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?

Options:

A.

The results of the organization's most recent privacy audit

B.

A notice of any contractual obligations that do not align with the privacy policy

C.

A copy of federal privacy laws regarding unauthorized data disclosure

D.

The organization's privacy policy and handling practices

Questions # 13:

Which activity is within the scope of the cloud provider’s role in the chain of custody?

Options:

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Questions # 14:

An organization negotiates a new contract with a cloud provider and wants to ensure that its critical business data is protected if the cloud provider goes out of business. For this reason, the organization wants the cloud provider to store a copy of the organization's data with a neutral third party, which would release the data in case the provider is unable to meet its obligations. Which type of provision should be included in the contract to ensure this?

Options:

A.

Indemnification

B.

Escrow

C.

Offboarding

D.

Encryption

Questions # 15:

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Questions # 16:

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Questions # 17:

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

Options:

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Questions # 18:

Which threat modeling process would a security analyst use to test a new application from a malicious actor's perspective?

Options:

A.

Damage, Reproducibility, Exploitability, Affected Users, and Discoverability (DREAD)

B.

Architecture, Threats, Attack Surfaces, and Mitigation (ATASM)

C.

Process for Attack Simulation and Threat Analysis (PASTA)

D.

Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges (STRIDE)

Questions # 19:

Which phase of the cloud data life cycle involves activities such as data categorization and classification, including data labeling, marking, tagging, and assigning metadata?

Options:

A.

Store

B.

Use

C.

Destroy

D.

Create

Questions # 20:

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.