100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D320 80 Question Version (JYO2) Managing Cloud Security (WGU) Questions with Complete Verified Solutions 2024.. $12.99   Add to cart

Exam (elaborations)

D320 80 Question Version (JYO2) Managing Cloud Security (WGU) Questions with Complete Verified Solutions 2024..

 357 views  3 purchases
  • Course
  • WGU D320
  • Institution
  • WGU D320

QUESTIONS AND ANSWERS

Preview 3 out of 16  pages

  • February 15, 2024
  • 16
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • WGU D320
  • WGU D320
avatar-seller
Brilliantgrades
D320 80 Question Version (JYO2) Managing Cloud Security (WGU) Questions with Complete Verified Solutions 2024.. Business Impact Analysis (BIA) A process that assesses and identifies the potential effects of disruptions to a business operation. SPOF A component or system that, if it fails, will cause the entire system to fail. Quantitative Risk assessment that uses specific numerical values Qualitative Risk assessment that uses non -numerical categories that are relative in nature, such as high, medium, and low. Risk appetite level, amount, or type of risk that the organization finds acceptable Residual risk The remaining risk that exists after countermeasures have been applied. IaaS Service model where cloud customer has the most responsibility and autho rity. Cloud provider is only liable for the underlying hardware. PaaS Service model where cloud customer loses more control because the cloud provider is responsible for installing, maintaining, and administering the OS as well as underlying hardware. SaaS Service model where cloud customer loses all control of the environment. Cloud provider is responsible for all of the underlying hardware and software. Homomorphic encryption A method of processing data in the cloud while it remains encrypted. Defense in depth A security strategy that involves implementing multiple overlapping layers of security measures to protect an environment. Data owner Organization that has collected or created the data. Data Custodian Person or entity that is tasked with the daily maintenance and administration of the data. Data Processor Any org or person who manipulates, stores, or moves the data on behalf of the data owner Data discovery The process of creating an inventory or conducting e -discovery to identify and locate data. Label-based discovery A data discovery method that is aided by labels created by the data owner. Metadata -based discovery A data discovery method that involves discovering data using metadata traits and characteristics. Content -based discovery Refers to fin ding information or resources based on their characteristics, attributes, or content rather than relying on predefined keywords or categories. Structured data Data that is organized and formatted in a way that is easily searchable and can be processed by computers. Unstructured data qualitative data; natural -language text; incorporate media (audio, video, images); contains JSON, XML, binary objects (images encoded as text strings); important for data analytic strategies; noSQL IRM (Information Rights Manage ment) A set of controls and technologies used to protect certain types of assets, such as intellectual property or sensitive information. Copyright Legal protection for expressions of ideas, such as literary, artistic, or musical works. DMCA (Digital Mille nnium Copyright Act) Legislation that provides additional protections for creative works in digital formats. Trademarks Legal protection for specific words, phrases, symbols, or designs that distinguish a product or service. Patent A grant of exclusivity that gives the holder the right to produce, sell, and import an invention. PKI (Public Key Infrastructure) A framework for secure communication using cryptographic techniques, such as digital certificates and public -private key pairs . File-based storage A method of storing data as files and folders, similar to how data is organized on a traditional file system. Block storage Allocates a large chunk of storage for access as a disk volume managed by the operating system. Object storage Stores files as individual objects managed by the cloud service provider. CDN (Content Delivery Network) A system that caches commonly requested content in geographically distributed servers to improve performance and reduce latency. Transparent encryption A form of encryption where the encryption key is stored on the same data store. Randomization The process of replacing data with random characters to make it less predictable and harder to decipher. Hashing The process of creating a unique fixed -size stri ng, called a hash, from an input data using a cryptographic function. Shuffling A technique that involves using different entries from the same dataset to represent data, making it harder to identify specific data points. Masking A method of hiding sensiti ve data by replacing it with useless characters or symbols. SIEM (Security Information and Event Management) A tool or system that allows for the monitoring, analysis, and management of security events and information within an organization. DLP (Data Loss Prevention) A set of tools and processes designed to protect sensitive information from unauthorized access, sharing, or loss. It helps organizations prevent the accidental or intentional leakage of confidential data. Private Cloud A distributed computing environment that is dedicated to a single customer or organization. Community Cloud A cloud computing model where resources are shared among a specific affinity group or community. Portability The ease or difficulty of transferring data out of a cloud pro vider's data center to another environment or provider. Vendor Lock -In A situation where a cloud provider uses proprietary data formats or mediums, making it difficult for a customer to switch to another provider. Vendor Lock -Out The inability to access an d recover data due to issues or disputes with a cloud provider. Hybrid Cloud

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Brilliantgrades. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99  3x  sold
  • (0)
  Add to cart