Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Managing-Cloud-Security Exam Dumps - WGU Managing Cloud Security (JY02, GZO1)

Searching for workable clues to ace the WGU Managing-Cloud-Security Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s Managing-Cloud-Security PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

Which cloud model is owned and operated by a vendor and then sold, leased, or rented to someone else?

A.

Private

B.

Hybrid

C.

Community

D.

Public

Full Access
Question # 34

An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?

A.

Consider options for portability and interoperability

B.

Enable multiple zones to mitigate service disruptions

C.

Revise contractual and personnel obligations

D.

Use best tools to securely connect to the cloud

Full Access
Question # 35

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Full Access
Question # 36

An organization is undergoing an ISO 27001 audit that includes a software as a service (SaaS) solution within scope, and the auditor has requested evidence of controls. What evidence should the organization provide the auditor?

A.

Network firewall rules

B.

Provider compliance attestation

C.

Operating system patch logs

D.

Physical diagram of the data center

Full Access
Question # 37

An organization’s help desk receives a call from a person claiming to be an employee wanting to verify their home address on file. The caller answers the basic authentication questions, so the help desk employee provides them the sensitive information. The organization later discovers that this call was fraudulent. Which type of threat does this represent?

A.

Man-in-the-middle attacks

B.

Social engineering

C.

Escalation of privilege

D.

Internal threats

Full Access
Question # 38

Which logical design model includes the foundations of a secure computing system, such as computing, networking, and storage?

A.

Infrastructure

B.

Infostructure

C.

Metastructure

D.

Applistructure

Full Access
Question # 39

Which tier from Uptime Institute's Data Center Site Infrastructure Tier Standards is considered to be the most secure, reliable, and redundant in design and operational elements?

A.

Tier IV

B.

Tier I

C.

Tier II

D.

Tier III

Full Access
Question # 40

An organization is conducting an external audit of the IT policies governing its production environment after moving all of its production systems to the cloud. Which IT policy will have a low priority in this environment?

A.

Data classification

B.

Hardware management

C.

Software procurement

D.

Acceptable use

Full Access
Go to page: