100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |AGRADE $17.99   Add to cart

Exam (elaborations)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |AGRADE

 6 views  0 purchase
  • Course
  • WGU C838 MANAGING CLOUD SECURITY
  • Institution
  • WGU C838 MANAGING CLOUD SECURITY

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST |AGRADE 1) You are the security subject matter expert (SME) for an organization considering atransitionfrom thelegacyenvironment intoahostedcloudprovider's data center. One of the challenges you 're facing is whe...

[Show more]

Preview 4 out of 36  pages

  • February 11, 2024
  • 36
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • WGU C838 MANAGING CLOUD SECURITY
  • WGU C838 MANAGING CLOUD SECURITY
avatar-seller
laurenjames
WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA
100 QUESTIONS AND ANSWERS LATEST2023-2024
|AGRADE




1) You are the security subject matter expert (SME) for an organization considering a transition from
the legacy environment into a hosted cloud provider's data center. One of the challenges you 're facing
is whether the cloud provider will be able to comply with the existing legislative and contractual
frameworks your organization is required to follow. This is a issue.

a. Resiliency
b. Privacy
c. Performance
d. Regulatory - ANSWER- D

2. You are the security subject matter expert (SME) for an organization consideringa transition from the
legacy environ ment into a hosted cloud provider 's data
center. One of the challenges you 're facing is whether the cloud provider will be able to allow your
organization to substantiate and determine with some assurance that all of the contract terms are being
met. This is a(n) issue.
a. Regulatory
b. Privacy
c. Resilien cy
d. Auditability - ANSWER- D

3. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.

,c. It might result in vendor lockout.
d. The data subjects might be upset by this. - ANSWER- B

4. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction tha
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. It could increase the possibility of physical theft.
b. Encryption won 't work throughout the environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within the organization. - ANSWER- C

5. Which of the following is not an element of the identification component of
identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisioning - ANSWER- C

6. Which of the following entities is most likely to play a vital role in the identity
provisioning aspect of a user 's experience in an organization?
a. The accounting department
b. The human resources (HR) office
c. The maintenance team
d. The purchasing office - ANSWER- B

7. Why is the deprovisioning element of the identification component of identityand access
management (IAM) so important? a. Extra accounts cost so much extra money.
b. Open but unassigned accounts are vulnerabilities.
c. User tracking is essential to performance.
d. Encryption has to be maintained. - ANSWER- B

8. All of the following are reasons to perform review and maintenance actions onuser accounts except
.
a. To determine whether the user still needs the same access

,b. To determine whether the user is still with the organization
c. To determine whether the data set is still applicable to the user 's role
d. To determine whether the user is still performing well - ANSWER- D

9. Who should be involved in review and maintenance of user accounts/access?
a. The user 's manager
b. The security manager
c. The accounting department
d. The incident response team - ANSWER- A

10. Which of the following protocols is most applicable to the identification
process aspect of identity and access management (IAM)?
a. Secure Sockets Layer (SSL)
b. Internet Protocol security (IPsec)
c. Lightweight Directory Access Protocol (LDAP)
d. Amorphous ancillary data transmission (AADT) - ANSWER- C

11. Privileged user (administrators, managers, and so forth) accounts need to bereviewed more
closely than basic user accounts. Why is this? a. Privileged users have more encryption keys.
b. Regular users are more trustworthy.
c. There are extra controls on privileged user accounts.
d. Privileged users can cause more damage to the organization. - ANSWER- D

12. The additional review activities that might be performed for privileged user
accounts could include all of the following except . a. Deeper
personnel background checks
b. Review of personal financial accounts for privileged users
c. More frequent reviews of the necessity for access
d. Pat-down checks of privileged users to deter against physical theft - ANSWER-D

13. If personal financial account reviews are performed as an additional review control for privileged
users, which of the following characteristics is least likely tobe a useful indicator for review purposes?
a. Too much money in the account
b. Too little money in the account
c. The bank branch being used by the privileged user

, d. Specific senders/recipients - ANSWER- C

14. How often should the accounts of privileged users be reviewed? a.
Annually
b. Twice a year
c. Monthly
d. More often than regular user account reviews - ANSWER- D

15. Privileged user account access should be .
a. Temporary
b. Pervasive
c. Thorough
d. Granular - ANSWER- A

16. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to
organizations participating in cloud computing. According tothe CSA 's Notorious Nine list, data
breaches can be . a. Overt or
covert
b. International or subterranean
c. From internal or external sources
d. Voluminous or specific - ANSWER- C

17. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to
organizations participating in cloud computing. According to the CSA, an organization that operates in
the cloud environment and suffers a databreach may be required to . a. Notify affected users
b. Reapply for cloud service
c. Scrub all affected physical memory
d. Change regulatory frameworks - ANSWER- A

18. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of common threats to
organizations participating in cloud computing. According tothe CSA, an organization that suffers a
data breach might suffer all of the following negative effects except . a. Cost of compliance with
notification laws
b. Loss of public perception/goodwill
c. Loss of market share

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller laurenjames. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
  Add to cart