Package deal
WGU C838 MANAGING CLOUD SECURITY EXAMS PACKAGE DEAL 2023/24
WGU C838 MANAGING CLOUD SECURITY EXAMS PACKAGE DEAL 2023/24
[Show more]WGU C838 MANAGING CLOUD SECURITY EXAMS PACKAGE DEAL 2023/24
[Show more]Which phase of the cloud data lifecycle allows both read and process functions to be performed? 
Create 
 
 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? 
Format-preserving encryption 
 
 
 
Which encryption tech...
Preview 2 out of 7 pages
Add to cartWhich phase of the cloud data lifecycle allows both read and process functions to be performed? 
Create 
 
 
 
Which technique scrambles the content of data using a mathematical algorithm while keeping the structural arrangement of the data? 
Format-preserving encryption 
 
 
 
Which encryption tech...
Cloud Bursting 
When a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. 
 
 
 
No; under current laws, liability and ri...
Preview 4 out of 59 pages
Add to cartCloud Bursting 
When a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for high/peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes. 
 
 
 
No; under current laws, liability and ri...
NIST 800-145 Cloud Computing Definition 
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
 
 
Business Impact Analy...
Preview 4 out of 55 pages
Add to cartNIST 800-145 Cloud Computing Definition 
A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction 
 
 
 
Business Impact Analy...
(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
 
(ISC)2 Clo...
Preview 2 out of 14 pages
Add to cart(ISC)2 - International Information System Security Certification Consortium 
A security certification granting organization that has a long history of certifications that were difficult to get. This difficulty has made their certificates seen as having higher value in the industry. 
 
 
 
(ISC)2 Clo...
encrypted 
Data created by the user should do this before uploading to the cloud. 
 
 
 
Public Key Infrastructure 
Dealing with keys and managing them 
 
 
 
PKI 
Framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to c...
Preview 1 out of 1 pages
Add to cartencrypted 
Data created by the user should do this before uploading to the cloud. 
 
 
 
Public Key Infrastructure 
Dealing with keys and managing them 
 
 
 
PKI 
Framework of programs, procedures, communication protocols, and public key cryptography that enables a diverse group of individuals to c...
What tool allows network administrators to capture and analyze data traversing 
their networks? 
Protocol analyzer 
 
 
 
Following a natural or manmade incident at your organization that involved loss of 
data from local HDDs and storage, what entity should you contact to enable recovery of 
data? ...
Preview 2 out of 11 pages
Add to cartWhat tool allows network administrators to capture and analyze data traversing 
their networks? 
Protocol analyzer 
 
 
 
Following a natural or manmade incident at your organization that involved loss of 
data from local HDDs and storage, what entity should you contact to enable recovery of 
data? ...
What are the 4 characteristics of cloud computing? 
Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
 
 
What NIST publication number defines cloud computing? 
800-145 
 
 
 
What ISO/IEC standard provides information on cloud computing? 
17788 
 
 
 
Wh...
Preview 4 out of 49 pages
Add to cartWhat are the 4 characteristics of cloud computing? 
Broad network access 
On-demand services 
Resource Pooling 
Measured or "metered" service 
 
 
 
What NIST publication number defines cloud computing? 
800-145 
 
 
 
What ISO/IEC standard provides information on cloud computing? 
17788 
 
 
 
Wh...
The Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity 
Integrity and Availability 
 
 
 
The Interception attack type most commonly affects which pri...
Preview 4 out of 32 pages
Add to cartThe Fabrication attack type most commonly affects which principle(s) of the CIA triad? 
 
A. Availability 
B. Integrity 
C. Confidentiality 
D. Integrity and Availability 
E. Confidentiality and Integrity 
Integrity and Availability 
 
 
 
The Interception attack type most commonly affects which pri...
When is the MOST optimal time to determine if data is classified as secure? 
The Creation phase is the most optimal time to classify data as secure. When data is created during the create phase, the sensitivity of the data is known. 
 
 
 
Discretionary Access Control (DAC) 
DAC is when the owner of...
Preview 2 out of 7 pages
Add to cartWhen is the MOST optimal time to determine if data is classified as secure? 
The Creation phase is the most optimal time to classify data as secure. When data is created during the create phase, the sensitivity of the data is known. 
 
 
 
Discretionary Access Control (DAC) 
DAC is when the owner of...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller BRAINBOOSTERS. Stuvia facilitates payment to the seller.
No, you only buy these notes for $40.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
71498 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now