Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ValidTests

Exam Managing-Cloud-Security All Questions
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

What is a risk in using the community cloud over the private cloud?

Options:

A.

Lack of virtual instances

B.

Loss of policy control

C.

Loss of trained personnel

D.

Lack of physical resources

Questions # 22:

Which element should a company implement when looking to provide the most secure foundation and smallest attack footprint for virtual servers?

Options:

A.

Application isolation

B.

Type 1 hypervisor

C.

Application virtualization

D.

Type 2 hypervisor

Questions # 23:

Which subject matter expert is relied upon to draft policies related to the organization’s operations in the cloud?

Options:

A.

Attorneys

B.

Risk management

C.

CCSP practitioner

D.

Senior management

Questions # 24:

A company has determined that encryption has too much overhead to work with their system and has identified tokenization as an alternative. During this process, the tokenization server generates the token. Which step should occur immediately after this action?

Options:

A.

Data is sent to the tokenization server.

B.

The application generates a piece of sensitive data.

C.

The tokenization server returns the token to the application.

D.

The application stores the token rather than the original data.

Questions # 25:

Which security measure controls virtualization in the cloud?

Options:

A.

Monitoring and logging

B.

Using a dedicated hosting

C.

Managing image assets

D.

Securing the hypervisor

Questions # 26:

Which risk is unable to be highlighted from the outset in a cloud services contract?

Options:

A.

Introduction of new technology

B.

Sunsetting of aging technology

C.

Result of an unforeseen event

D.

Changes resulting from contract renewals

Questions # 27:

A company is interested in tokenization as an alternative to protecting data without encryption. The application will soon store the token. Which step should occur immediately before this action?

Options:

A.

The tokenization server generates the token for the application.

B.

The tokenization server returns the token to the application.

C.

An authorized application requests the token.

D.

Data is sent to the tokenization server.

Questions # 28:

What is an appropriate countermeasure given the threat of a power outage of a cloud service provider?

Options:

A.

Database replication

B.

Storage array replication

C.

Web application firewalls

D.

Backup generators

Questions # 29:

Which logical consideration should be addressed when planning the design of a data center?

Options:

A.

Multitenancy of networks

B.

Heating and cooling

C.

Ability for expansion

D.

Utility power availability

Questions # 30:

Which security device allows customers to redirect traffic?

Options:

A.

Security information and event management

B.

Intrusion detection and prevention systems

C.

Web application firewalls

D.

Cryptographic key management

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions