Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ValidTests

Exam Managing-Cloud-Security All Questions
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

Options:

A.

Hashing

B.

Encryption

C.

Masking

D.

Tokenization

Questions # 42:

A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?

Options:

A.

Multi-layer control

B.

Tertiary control

C.

Ancillary control

D.

Compensating control

Questions # 43:

Which platform component includes containers and storage?

Options:

A.

Security

B.

Monitoring

C.

Networking

D.

Compute

Questions # 44:

Which action should be taken to preserve forensic evidence for collection?

Options:

A.

Implementing serverless architectures

B.

Enabling threat modeling

C.

Pausing the virtual machine

D.

Enforcing mutable servers

Questions # 45:

Which characteristic could affect the audit process for a customer of a cloud service provider?

Options:

A.

Lack of physical access to the cloud infrastructure

B.

Utilization constraints on the bandwidth imposed by the cloud service vendor

C.

Limits for up-time of the hosted system

D.

Restrictions on the data storage options offered by the cloud service provider

Questions # 46:

Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?

Options:

A.

Stark Law

B.

Healthcare Quality Improvement Law

C.

Health Insurance Portability and Accountability Act

D.

Gramm-Leach-Bliley Act

Questions # 47:

An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?

Options:

A.

Network firewall rules

B.

Provider compliance attestation

C.

Operating system patch logs

D.

Physical diagram of the data center

Questions # 48:

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

Options:

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Questions # 49:

Which process involves identification and valuation of assets in order to determine their potential effect on cloud operations?

Options:

A.

Risk transfer

B.

Vulnerability assessment

C.

Business impact analysis

D.

Out-of-band validation

Questions # 50:

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.

Reliability

B.

Scalability

C.

Portability

D.

Availability

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions