Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Managing-Cloud-Security Exam Dumps - WGU Managing Cloud Security (JY02, GZO1)

Searching for workable clues to ace the WGU Managing-Cloud-Security Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Managing-Cloud-Security PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

A.

Measured service

B.

Resource pooling

C.

On-demand self-service

D.

Rapid elasticity

Full Access
Question # 18

Which regulation defines requirements for the electronic transfer of healthcare data to a cloud service provider?

A.

Stark Law

B.

Healthcare Quality Improvement Law

C.

Health Insurance Portability and Accountability Act

D.

Gramm-Leach-Bliley Act

Full Access
Question # 19

In which cloud service model is the cloud consumer responsible for installation and maintenance of the operating system?

A.

Network as a Service (NaaS)

B.

Platform as a Service (PaaS)

C.

Infrastructure as a Service (IaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 20

Which security device includes anti-distributed denial of service (DDoS) capabilities in order to protect cloud data storage?

A.

Extensible markup language (XML) gateway

B.

Web application firewall (WAF)

C.

Network-based database activity monitor (NDAM)

D.

Agent-based database activity monitor (ADAM)

Full Access
Question # 21

An organization designing a data center wants the ability to quickly create and shut down virtual systems based on demand. Which concept describes this capability?

A.

Resource scheduling

B.

High availability

C.

Ephemeral computing

D.

Maintenance mode

Full Access
Question # 22

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

A.

It should destroy them only if the contract includes hardware disposal insurance.

B.

It should use cryptographic erasure to securely remove any personal data from the drives.

C.

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.

It should use degaussing tools to securely remove any personal data from the drives.

Full Access
Question # 23

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

A.

Recovery time objective

B.

Data protection requirements

C.

SLA penalties

D.

Suspension of service clause

Full Access
Question # 24

Which security control is a countermeasure against vendor lock-in and lock-out?

A.

Offsite backups

B.

Video surveillance

C.

Disk redundancy

D.

Training programs

Full Access
Go to page: