100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU D320 MANAGING CLOUD SECURITY OA AND PA EXAM 300 QUESTIONS AND ANSWERS REAL EXAM . $18.49   Add to cart

Exam (elaborations)

WGU D320 MANAGING CLOUD SECURITY OA AND PA EXAM 300 QUESTIONS AND ANSWERS REAL EXAM .

 5 views  0 purchase
  • Course
  • WGU D320
  • Institution
  • WGU D320

WGU D320 MANAGING CLOUD SECURITY OA AND PA EXAM 300 QUESTIONS AND ANSWERS REAL EXAM . OWASP 3: Injection – ANSWER an attacker's attempt to send data to an application in a way that will change the meaning of commands being sent to an interpreter OWASP 4: Insecure Design – ANSWER focus...

[Show more]

Preview 4 out of 39  pages

  • October 27, 2024
  • 39
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • wgu d320
  • WGU D320
  • WGU D320
avatar-seller
maleek
WGU D320 MANAGING CLOUD SECURITY OA AND
PA EXAM 300 QUESTIONS AND ANSWERS REAL
EXAM 2024-2025.



OWASP 3: Injection – ANSWER an attacker's attempt to send data to an application in a
way that will change the meaning of commands being sent to an interpreter


OWASP 4: Insecure Design – ANSWER focuses on risks related to design and
architectural flaws, with a call for more use of threat modeling, secure design patterns,
and reference architectures


OWASP 5: Security Misconfiguration – ANSWER occurs when system or
applicationconfiguration settings are missing or are erroneously implemented,
allowing unauthorized access


OWASP 6: Vulnerable and Outdated Components – ANSWER third-party libraries or
frameworks used in web applications that have known vulnerabilities or are no longer
supported by their developers


OWASP 7: Identification and Authentication Failures – ANSWER The failure of a
systemto identify and/or authenticate leaves the application susceptible to attacks and
leaves user accounts/data at risk




Sarbanes-Oxley (SOX) Act – ANSWER increase transparency into publicly traded
corporations' financial activities


Gramm-Leach-Bliley Act (GLBA) – ANSWER allow banks to merge and own insurance
companies

,Clarifying Lawful Overseas Use of Data (CLOUD) Act – ANSWER Allows US law
enforcement and courts to compel American companies to disclose data stored in
foreign data centers


FERPA – ANSWER prevent academic institutions from sharing student data other than
parents or student


Master service agreement (MSA) – ANSWER provide an umbrella contract for the
workthat a vendor does with an organization over an extended period of time


Service level agreement (SLA) – ANSWER written contracts that specify the conditions
of service that will be provided by the vendor and the remedies available to the
customer if the vendor fails to meet the SLA


Business partnership agreement (BPA) – ANSWER exist when two organizations
agreeto do business with each other in a partnerhsip


memorandum of understanding (MOU) – ANSWER a letter written to document
aspectsof the relationship to avoid future misunderstandings


OWASP Top Ten – ANSWER a standard awareness document for developers and
webapplication security, it represents a broad consensus about the most critical
security risks to web applications.


OWASP 1: Access Control – ANSWER enforces policy such that users cannot
actoutside of their intended permissions


OWASP 2: Cryptographic Failures – ANSWER focus is on failures related to
cryptography (or lack thereof), Which often lead to exposure of sensitive data.

,OWASP 8: Software and Data Integrity Failures – ANSWER relate to code and
infrastructure that does not protect against integrity violations; occur when an attacker
can modify or delete data in an unauthorized manner


OWASP 9: Security Logging and Monitoring Failures – ANSWER this category is to
helpdetect, escalate, and respond to active breaches, without logging and monitoring,
breaches cannot be detected


OWASP 10: Server Side Request Forgery (SSRF) – ANSWER occur whenever a web
application is fetching a remote resource without validating the user-supplied URL,
allows an attacker to coerce the application to send a crafted request to an unexpected
destination, even when protected by a firewall, VPN, or another type of network access
control list (ACL).


data lifecycle – ANSWER Create, Store, Use, Share, Archive, Destroy


SOC 1 Report – ANSWER strictly for auditing the financial reporting instruments of a
corporation


SOC 2 Report – ANSWER Intended to report audits of any controls on an organization's
security, availability, processing integrity, confidentiality, and privacy


SOC 3 Report – ANSWER Designed to be shared with the public, does not contain any
actual data about the security controls of the audit target.

, SOC 2 Type 1 Report - ANSWERReviews the design of controls, not how they are
implemented or maintained


SOC 2 Type 2 Report - ANSWERUsed for getting a true assessment of an
organization's security posture


IaaS risks - ANSWER1. Personnel threats (insiders)
2. External threats (malware, hacking, DDoS, MITM)
3. Lack of specific skillsets


PaaS risks - ANSWER1. Interoperability issues
2. Persistent backdoors, DevOps
3. Virtualization
4. Resource sharing


SaaS risks - ANSWER1. Proprietary formats
2. Virtualization
3. Web app security


regulators - ANSWERinvolved in cloud service arrangements


critiques - ANSWERfalls under the exceptions category for "fair-use" copyrighted
material


Cloud-Secure Software Deployment Lifecycle (SDLC) - ANSWERDefining, Designing,
Development, Testing, Secure Operations, Disposal


Defining - ANSWERFocused on identifying the business requirements of the
application, such as accounting, database, or customer relationship management


Designing - ANSWERBegin to develop user stories (what the user will want to
accomplish, what the interface will look like and whether it will require the use or
development of any APIs)


Development - ANSWERwhere the code is written

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller maleek. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $18.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$18.49
  • (0)
  Add to cart