Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

Managing-Cloud-Security Sample Questions Answers

Questions 4

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.

Event management team

B.

Problem management team

C.

Change management board

D.

Executive management board

Buy Now
Questions 5

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

Options:

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Buy Now
Questions 6

Which business area in the enterprise risk management (ERM) strategy is concerned with formal risk assessments when forming new or renewing existing vendor relationships?

Options:

A.

Software development

B.

Procurement

C.

Quality assurance

D.

Marketing

Buy Now
Questions 7

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.

Traffic inspection

B.

Zero trust

C.

Intrusion prevention

D.

Secret management

Buy Now
Questions 8

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

Options:

A.

Quantum computing

B.

Change tracking

C.

Key management

D.

Regulatory compliance

Buy Now
Questions 9

During a financial data investigation, the investigator is unsure how to handle a specific data set. Which set of documentation should they refer to for detailed steps on how to proceed?

Options:

A.

Policies

B.

Procedures

C.

Legal rulings

D.

Legal definitions

Buy Now
Questions 10

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.

Vendor lock-out

B.

Vendor lock-in

C.

Personnel threat

D.

Natural disaster

Buy Now
Questions 11

Which section of a contract includes the customer's right to audit the vendor to verify whether the vendor is fulfilling its contractual obligations?

Options:

A.

Assurance

B.

Indemnification

C.

Termination

D.

Litigation

Buy Now
Questions 12

After creating a backup set, an engineer stores the backups according to company policy. Which action should the engineer take periodically to ensure the backed-up data is viable?

Options:

A.

The engineer should test the backups according to company policy.

B.

The engineer should delete backups according to company policy.

C.

The engineer should compare the old backups with newer ones.

D.

The engineer should replace the old backups with newer ones.

Buy Now
Questions 13

An organization consists of many divisions. Its leadership team has gathered the managers and key team members in each division to help create a disaster recovery plan. It studies the type of natural events that commonly occur and the risk involved for each location in which the organization has a data center. What is the leadership team doing in this scenario?

Options:

A.

Performing an asset inventory

B.

Running a disaster declaration process

C.

Identifying the actions

D.

Defining the disaster criteria

Buy Now
Questions 14

An organization is sharing personal information that is defined in its privacy policy with a trusted third party. What else should the organization communicate to the trusted third party about the personal information?

Options:

A.

The results of the organization's most recent privacy audit

B.

A notice of any contractual obligations that do not align with the privacy policy

C.

A copy of federal privacy laws regarding unauthorized data disclosure

D.

The organization's privacy policy and handling practices

Buy Now
Questions 15

Which release management term describes the process from code implementation to code review and approval to automated testing and then to production deployment?

Options:

A.

Iteration

B.

Baseline

C.

Pipeline

D.

Framework

Buy Now
Questions 16

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Buy Now
Questions 17

Which setting ensures that an attacker cannot read the information stored temporarily for use by another virtual machine (VM)?

Options:

A.

Encrypted network protocols

B.

Encrypted file system

C.

Dedicated processor

D.

Dedicated memory

Buy Now
Questions 18

An organization wants to ensure that all entities trust any certificate generated internally in the organization. What should be used to generate these certificates?

Options:

A.

Individual users’ private keys

B.

The organization's certificate repository server

C.

The organization's certificate authority server

D.

Individual systems' private keys

Buy Now
Questions 19

Which cloud computing service model allows customers to run their own application code without configuring the server environment?

Options:

A.

Data science as a service (DSaaS)

B.

Infrastructure as a service (IaaS)

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Buy Now
Questions 20

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Buy Now
Questions 21

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.

Key revocation

B.

Physical destruction

C.

Overwriting

D.

Degaussing

Buy Now
Questions 22

When should a cloud service provider delete customer data?

Options:

A.

When the cloud provider oversubscribes its storage space

B.

When the data has not been accessed in the last 30 days

C.

After a scheduled data review

D.

After the specified retention period

Buy Now
Questions 23

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.

Emergency response team (ERT)

B.

Security operations center (SOC)

C.

Disaster response team (DRT)

D.

Network operations center (NOC)

Buy Now
Questions 24

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.

Hashing

B.

Encryption

C.

Change tracking

D.

Metadata labeling

Buy Now
Exam Code: Managing-Cloud-Security
Exam Name: WGU Managing Cloud Security (JY02)
Last Update: Oct 5, 2025
Questions: 80
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now Managing-Cloud-Security