Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Managing-Cloud-Security Exam Dumps - WGU Managing Cloud Security (JY02)

Go to page:
Question # 17

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

A.

Staging

B.

Code review

C.

Code testing

D.

Rollback

Full Access
Question # 18

Which tool provides a dedicated environment to contain and analyze malware?

A.

Encryption

B.

Gateway

C.

Sandbox

D.

Controller

Full Access
Question # 19

Which activity is within the scope of the cloud provider’s role in the chain of custody?

A.

Setting data backup and recovery policies

B.

Collecting and preserving digital evidence

C.

Initiating and executing incident response

D.

Classifying and analyzing data

Full Access
Question # 20

Which action should a customer take to add an extra layer of protection to the data stored in a public cloud environment?

A.

Use additional encryption for sensitive files and folders

B.

Use web application firewalls (WAFs)

C.

Use database activity monitoring (DAM)

D.

Use block storage instead of file storage

Full Access
Question # 21

An organization is informed by its cloud provider that a storage device containing some of the organization’s data has been seized as possible evidence in a court case, but the organization itself is not involved in any ongoing court cases. Which characteristic of a cloud environment architecture makes such a scenario possible?

A.

Virtualization

B.

Multitenancy

C.

Software as a service (SaaS)

D.

Platform as a service (PaaS)

Full Access
Question # 22

An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?

A.

They should create a checklist of the necessary tasks.

B.

They should determine the criteria of a disaster.

C.

They should identify the key roles in a disaster.

D.

They should perform an inventory of assets.

Full Access
Question # 23

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

A.

The Statement on Standards for Attestation Engagements (SSAE) 18

B.

The International Standard on Review Engagements (ISRE) 2400

C.

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.

The International Standard on Assurance Engagements (ISAE) 3402

Full Access
Question # 24

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

A.

Privacy control

B.

Protection levels

C.

Risk acceptance

D.

Compensating control

Full Access
Go to page: