Latest (Created January 2024. D320 -
Managing Cloud Security (WGU)
Already Passed!!
Business Impact Analysis (BIA) Answer- A process that assesses and identifies the
potential effects of disruptions to a business operation.
SPOF Answer- A component or system that, if it fails, will cause the entire system to
fail.
Quantitative Answer- Risk assessment that uses specific numerical values
Qualitative Answer- Risk assessment that uses non-numerical categories that are
relative in nature, such as high, medium, and low.
Risk appetite Answer- level, amount, or type of risk that the organization finds
acceptable
Residual risk Answer- The remaining risk that exists after countermeasures have
been applied.
IaaS Answer- Service model where cloud customer has the most responsibility and
authority. Cloud provider is only liable for the underlying hardware.
PaaS Answer- Service model where cloud customer loses more control because the
cloud provider is responsible for installing, maintaining, and administering the OS as
well as underlying hardware.
SaaS Answer- Service model where cloud customer loses all control of the
environment. Cloud provider is responsible for all of the underlying hardware and
software.
Homomorphic encryption Answer- A method of processing data in the cloud while it
remains encrypted.
Defense in depth Answer- A security strategy that involves implementing multiple
overlapping layers of security measures to protect an environment.
, Data owner Answer- Organization that has collected or created the data.
Data Custodian Answer- Person or entity that is tasked with the daily maintenance
and administration of the data.
Data Processor Answer- Any org or person who manipulates, stores, or moves the
data on behalf of the data owner
Data discovery Answer- The process of creating an inventory or conducting e-
discovery to identify and locate data.
Label-based discovery Answer- A data discovery method that is aided by labels
created by the data owner.
Metadata-based discovery Answer- A data discovery method that involves
discovering data using metadata traits and characteristics.
Content-based discovery Answer- Refers to finding information or resources based
on their characteristics, attributes, or content rather than relying on predefined
keywords or categories.
Structured data Answer- Data that is organized and formatted in a way that is easily
searchable and can be processed by computers.
Unstructured data Answer- qualitative data; natural-language text; incorporate
media (audio, video, images); contains JSON, XML, binary objects (images encoded
as text strings); important for data analytic strategies; noSQL
IRM (Information Rights Management) Answer- A set of controls and technologies
used to protect certain types of assets, such as intellectual property or sensitive
information.
Copyright Answer- Legal protection for expressions of ideas, such as literary,
artistic, or musical works.
DMCA (Digital Millennium Copyright Act) Answer- Legislation that provides
additional protections for creative works in digital formats.
Trademarks Answer- Legal protection for specific words, phrases, symbols, or
designs that distinguish a product or service.
Patent Answer- A grant of exclusivity that gives the holder the right to produce, sell,
and import an invention.
PKI (Public Key Infrastructure) Answer- A framework for secure communication
using cryptographic techniques, such as digital certificates and public-private key
pairs.