Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ValidTests

Exam Managing-Cloud-Security All Questions
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which device identifies and stops attack-based commands from executing on a structured query language (SQL) server?

Options:

A.

Host-based firewall

B.

Database activity monitor

C.

Hardware security module

D.

Cloud access and security broker

Questions # 32:

An organization is considering a cloud provider that has multivendor pathway connectivity. What does this feature provide?

Options:

A.

Connections to several electric providers that are not on the same grid

B.

Contracts with fuel providers

C.

Contracts with heating, ventilation, and air conditioning (HVAC) providers

D.

Connections to several internet service providers

Questions # 33:

Which cloud computing role can subscribe to a software as a service (SaaS) application?

Options:

A.

Cloud service customer

B.

Cloud computing

C.

Cloud service provider

D.

Cloud application

Questions # 34:

Which data retention method is used for business continuity and disaster recovery (BC/DR) backups?

Options:

A.

Archiving and retrieval procedures

B.

Data classification

C.

Local agent checks

D.

Monitoring and enforcement

Questions # 35:

Which country lacks a national law assuring individual personal privacy?

Options:

A.

New Zealand

B.

Canada

C.

United States

D.

Israel

Questions # 36:

Which security information and event management concept focuses on account and service hijacking issues?

Options:

A.

Digital forensics

B.

Trust

C.

Lightweight Directory Access Protocol

D.

Access control

Questions # 37:

Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?

Options:

A.

Desktop as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Questions # 38:

How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?

Options:

A.

Using round-robin load balancing

B.

Rerouting traffic to the mitigation services

C.

Having multiple endpoints

D.

Scaling the receiving application

Questions # 39:

Which role ensures that third parties take adequate technical and organizational security measures to safeguard data?

Options:

A.

Cloud user

B.

Data controller

C.

Cloud provider

D.

Data subject

Questions # 40:

An engineer needs to create segmentation using the built-in tools provided by the company's cloud provider. The InfoSec team has given the engineer directions to limit traffic using a security group between two cloud deployments in the organization. Which mechanisms should the engineer use to create this segmentation?

Options:

A.

MAC addresses and protocols

B.

Ports and protocols

C.

Unique identifiers and protocols

D.

Definitions and protocols

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions