Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ValidTests

Exam Managing-Cloud-Security All Questions
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

An accountant in an organization is allowed access to a company's human resources database only to adjust the number of hours that the organization’s employees have worked in a fiscal year. However, the accountant modifies an employee's personal information. Which part of the STRIDE model describes this situation?

Options:

A.

Spoofing

B.

Denial of service

C.

Tampering

D.

Elevation of privilege

Questions # 2:

Which data source provides auditability and traceability for event investigation as well as documentation?

Options:

A.

Block storage

B.

Object storage

C.

Database logs

D.

Database rows

Questions # 3:

Which cloud risk is associated with the supply chain due to dependency on legacy internal servers for application delivery to end users?

Options:

A.

Natural disasters

B.

Outages

C.

Fast run time

D.

Homomorphic encryption

Questions # 4:

Which level of compliance is required by a cloud service provider to protect customer data at banks and insurance companies?

Options:

A.

IDEA

B.

DMCA

C.

FERPA

D.

GLBA

Questions # 5:

Which technology is increasingly deployed in enterprise environments for applications such as digital tracking of the supply chain?

Options:

A.

Internet of Things

B.

Cloud computing

C.

Big data

D.

Machine learning

Questions # 6:

Which phase of the cloud secure data lifecycle is being viewed and processed without modification?

Options:

A.

Store

B.

Create

C.

Use

D.

Share

Questions # 7:

Which design component contains both a remotely accessible application programming interface (API) and a web graphical user interface?

Options:

A.

Infrastructure

B.

Management

C.

Applistructure

D.

Metastructure

Questions # 8:

As part of training to help the data center engineers understand different attack vectors that affect the infrastructure, they work on a set of information about access and availability attacks that was presented. Part of the labs requires the engineers to identify different threat vectors and their names. Which threat prohibits the use of data by preventing access to it?

Options:

A.

Brute force

B.

Encryption

C.

Rainbow tables

D.

Denial of service

Questions # 9:

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

Options:

A.

Conflicting regulations in different jurisdictions

B.

Collection and use of genetic information

C.

Data breach notification requirements

D.

Use of digital surveillance by multinational employers

Questions # 10:

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

Options:

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions