WGU COURSE C838 - MANAGING CLOUD SECURITY
EXAM 1000+ QUESTIONS WITH ANSWERS LATEST 2024
A+ GRADED
Which of the following laws decides which law is most appropriate in event of disputing laws in different
states?
A Restatement (second) conflict of law
B International law
C Criminal law
D The doctrine of the proper law - correct answers ✅A
What is defined as an information used for distinguishing and tracing the identity of an individual?
A e-Discovery
B IAM (identity and access management)
C IRM (information rights management)
D PII (personally identifiable information) - correct answers ✅D
What should a CCSP do to assure and perform proper auditing on VMs and hypervisors?
A Understand configuration management architecture
B Verify system updates according to organizational policy
C Verify hypervisor configuration according to remote access policy
D Verify hypervisor configuration according to organizational policy - correct
answers ✅D
Which organization focuses on enhancing the need to protect privacy using personal data using a
practical, risk-management-based approach?
,WGU COURSE C838 - MANAGING CLOUD SECURITY
EXAM 1000+ QUESTIONS WITH ANSWERS LATEST 2024
A+ GRADED
A General Data Protection Regulation
B Asia-Pacific Economic Cooperation
C Organization for Economic Cooperation and Development
D EU data protection directive - correct answers ✅C
Which type of audit report requires the details of the tests performed by the service auditor and is
conducted according to the SSAE 16 (Statement on
Standards for Attestation Engagement)? - correct answers ✅SOC 1 & SOC 2 Who among the following is
responsible to validate that all the relevant laws and statutes pertaining to their investigation are
documented before starting the investigation?
A CSP
B CSB
C Cloud consumer
D CCSP - correct answers ✅D
______________________ meters what is provided, to ensure that consumers only use what they are
allotted, and, if necessary, to charge them for it. This is where the term utility computing comes from,
since computing resources can now be consumed like water and electricity, with the client only paying
for what they use. - correct answers ✅Measured service
The key difference between cloud and traditional computing is the_________________, which includes
the management plane components, which are network-enabled and remotely accessible. Another key
difference is you tend to double up on each layer. - correct answers ✅metastructure
In some cases, it may be necessary to obtain prior permission of the local Data Protection Commissioner
before transferring data in or out of the country.
According to GDPR Policy, breaches must be reported within 72 hours of the company becoming aware
of the incident.
A True
B False - correct answers ✅A
___________ are the logs, documentation, and other materials needed for audits and compliance; they
are the evidence to support compliance activities. - correct answers ✅Artifacts
Ensuring the use of data and information complies with organizational policies, standards, and strategy
— including regulatory, contractual, and business
___________ abstracts the running of code (including operating systems) from the underlying hardware
and most commonly refers to virtual machines. - correct answers ✅Compute virtualization
Which phase of the cloud data life cycle allows both read and process functions to be performed?
A Create
B Archive
C Store
D Share - correct answers ✅A
Which phase of the cloud data security life cycle typically occurs simultaneously with creation?
, WGU COURSE C838 - MANAGING CLOUD SECURITY
EXAM 1000+ QUESTIONS WITH ANSWERS LATEST 2024
A+ GRADED
A Share
B Store
C Use
D Destroy - correct answers ✅B
Which phase of the cloud data life cycle uses content delivery networks?
A Destroy
B Archive
C Share
D Create - correct answers ✅C
Which phase of the cloud data life cycle is associated with crypto-shredding?
A Share
B Use
C Destroy
D Store - correct answers ✅C
Which cloud data storage architecture allows sensitive data to be replaced with unique identification
symbols that retain all the essential information about the data without compromising its security?
A Randomization
B Obfuscation
C Anonymization
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller mikedoc. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $21.49. You're not tied to anything after your purchase.