Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Managing-Cloud-Security Exam Dumps - WGU Managing Cloud Security (JY02)

Go to page:
Question # 4

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

A.

Automatic expiration

B.

Dynamic policy control

C.

Persistent protection

D.

Continuous auditing

Full Access
Question # 5

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

A.

Continuous monitoring

B.

Confidential computing

C.

Regulatory oversight

D.

Incident management

Full Access
Question # 6

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

A.

Full testing

B.

Nonfunctional testing

C.

Tabletop testing

D.

Functional testing

Full Access
Question # 7

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

A.

Conflicting regulations in different jurisdictions

B.

Collection and use of genetic information

C.

Data breach notification requirements

D.

Use of digital surveillance by multinational employers

Full Access
Question # 8

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

A.

Network segmentation

B.

Application whitelisting

C.

Multifactor authentication (MFA)

D.

Trusted platform module (TPM)

Full Access
Go to page: