Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Pass the WGU Courses and Certificates Managing-Cloud-Security Questions and answers with ValidTests

Exam Managing-Cloud-Security All Questions
Exam Managing-Cloud-Security Premium Access

View all detail and faqs for the Managing-Cloud-Security exam

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

Options:

A.

Cases

B.

Stories

C.

Cookies

D.

Notes

Questions # 52:

A business wants to avoid buying physical hardware and wants to host a PCI DSS–compliant application using the infrastructure as a service (IaaS) model of a public cloud provider. Which method can be used to provide network monitoring security controls in this environment?

Options:

A.

Sniffed network ports

B.

Cloud service provider audit logs

C.

Host agent intrusion detection system

D.

Redundant network firewalls

Questions # 53:

Which security testing method requires compliance with the cloud service provider’s terms of service?

Options:

A.

Vulnerability assessment

B.

Continuous delivery pipeline

C.

Static analysis

D.

Code review

Questions # 54:

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Questions # 55:

Which U.S. law requires all publicly traded corporations in the United States to provide information about their financial status and implements controls to ensure the accuracy of the disclosed information?

Options:

A.

The Gramm-Leach-Bliley Act (GLBA)

B.

The General Data Protection Regulation (GDPR)

C.

The Sarbanes-Oxley (SOX) Act

D.

The Clarifying Lawful Overseas Use of Data (CLOUD) Act

Questions # 56:

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Questions # 57:

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

Options:

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Questions # 58:

Which data retention policy addresses how long data must be retained to meet regulatory requirements?

Options:

A.

Formats

B.

Classification

C.

Retrieval

D.

Periods

Questions # 59:

Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?

Options:

A.

Insurance

B.

Avoidance

C.

Mitigation

D.

Acceptance

Questions # 60:

Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?

Options:

A.

Quality of Service (QoS)

B.

Distributed Denial of Service (DDoS)

C.

Intrusion Detection System (IDS)

D.

Runtime Application Self-Protection (RASP)

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions