Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam


721 Students Passed

88% Average Score

92% Same Questions
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

Which regulation restricts the government from forcing a cloud service provider to disclose customer data?

Options:

A.

GLBA

B.

SOX

C.

SCA

D.

ECPA

Questions # 62:

Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?

Options:

A.

Host-based firewall

B.

Database activity monitor

C.

Hardware security module

D.

Cloud access and security broker

Questions # 63:

Which management process involves multiple key holders, each with access to a portion of the information?

Options:

A.

Recovery

B.

Revocation

C.

Distribution

D.

Escrow

Questions # 64:

Which risk relates to the removal of a person’s information within the public cloud by legal authorities?

Options:

A.

Remote wiping

B.

Vendor lock-in

C.

Data masking

D.

Data seizure

Questions # 65:

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.

Change

B.

Error

C.

Disruption

D.

Bug

Questions # 66:

An organization is going through the process of selecting a new enterprise resource management (ERM) vendor. The organization has already selected the vendor and is now preparing to go through the onboarding process. Which specific issues should be discussed between the organization and the vendor during this phase?

Options:

A.

Verifying the details of the contract and arrangements for data transfer

B.

Ensuring the vendor has securely destroyed all confidential information

C.

Identifying the business need the vendor will address

D.

Deciding how to respond to the request for proposal (RFP)

Questions # 67:

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

Options:

A.

Long-running VMs that still run standard security controls may be isolated on the network.

B.

They are locked down more than the usual servers and tend to run a smaller set of services.

C.

The traditional tools are not normally designed for that degree of velocity.

D.

Some agents require opening additional firewall ports, which increases the network attack surface.

Questions # 68:

What is the first phase of identity management that is used to assert the identity of the user?

Options:

A.

Centralization

B.

Decentralization

C.

Provisioning

D.

Deprovisioning

Questions # 69:

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

Options:

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

Questions # 70:

Which data management activity is considered legal fair use of a copyrighted item?

Options:

A.

Reporting the work on the news

B.

Performing the work publicly

C.

Exporting the work

D.

Broadcasting the work

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.