100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
D320 80 Question Version (JYO2) Latest (Created January 2024. D320 - Managing Cloud Security (WGU) Already Passed!! $14.49   Add to cart

Exam (elaborations)

D320 80 Question Version (JYO2) Latest (Created January 2024. D320 - Managing Cloud Security (WGU) Already Passed!!

1 review
 324 views  6 purchases
  • Course
  • WGU D320
  • Institution
  • WGU D320

D320 80 Question Version (JYO2) Latest (Created January 2024. D320 - Managing Cloud Security (WGU) Already Passed!!

Preview 2 out of 15  pages

  • January 27, 2024
  • 15
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers
  • WGU D320
  • WGU D320

1  review

review-writer-avatar

By: jordanmatthewmenendez • 2 months ago

avatar-seller
EvaTee
D320 80 Question Version (JYO2) Latest (Created January 2024. D320 - Managing Cloud Security (WGU) Already Passed!!
Business Impact Analysis (BIA) Answer- A process that assesses and identifies the potential effects of disruptions to a business operation.
SPOF Answer- A component or system that, if it fails, will cause the entire system to
fail.
Quantitative Answer- Risk assessment that uses specific numerical values
Qualitative Answer- Risk assessment that uses non-numerical categories that are relative in nature, such as high, medium, and low.
Risk appetite Answer- level, amount, or type of risk that the organization finds acceptable
Residual risk Answer- The remaining risk that exists after countermeasures have been applied.
IaaS Answer- Service model where cloud customer has the most responsibility and authority. Cloud provider is only liable for the underlying hardware.
PaaS Answer- Service model where cloud customer loses more control because the
cloud provider is responsible for installing, maintaining, and administering the OS as well as underlying hardware.
SaaS Answer- Service model where cloud customer loses all control of the environment. Cloud provider is responsible for all of the underlying hardware and software.
Homomorphic encryption Answer- A method of processing data in the cloud while it remains encrypted.
Defense in depth Answer- A security strategy that involves implementing multiple overlapping layers of security measures to protect an environment. Data owner Answer- Organization that has collected or created the data.
Data Custodian Answer- Person or entity that is tasked with the daily maintenance and administration of the data.
Data Processor Answer- Any org or person who manipulates, stores, or moves the data on behalf of the data owner
Data discovery Answer- The process of creating an inventory or conducting e-
discovery to identify and locate data.
Label-based discovery Answer- A data discovery method that is aided by labels created by the data owner.
Metadata-based discovery Answer- A data discovery method that involves discovering data using metadata traits and characteristics.
Content-based discovery Answer- Refers to finding information or resources based on their characteristics, attributes, or content rather than relying on predefined keywords or categories.
Structured data Answer- Data that is organized and formatted in a way that is easily searchable and can be processed by computers.
Unstructured data Answer- qualitative data; natural-language text; incorporate media (audio, video, images); contains JSON, XML, binary objects (images encoded
as text strings); important for data analytic strategies; noSQL
IRM (Information Rights Management) Answer- A set of controls and technologies used to protect certain types of assets, such as intellectual property or sensitive information.
Copyright Answer- Legal protection for expressions of ideas, such as literary, artistic, or musical works.
DMCA (Digital Millennium Copyright Act) Answer- Legislation that provides additional protections for creative works in digital formats.
Trademarks Answer- Legal protection for specific words, phrases, symbols, or designs that distinguish a product or service.
Patent Answer- A grant of exclusivity that gives the holder the right to produce, sell, and import an invention.
PKI (Public Key Infrastructure) Answer- A framework for secure communication using cryptographic techniques, such as digital certificates and public-private key pairs.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

71184 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49  6x  sold
  • (1)
  Add to cart