Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

WGU Managing Cloud Security (JY02) Question and Answers

WGU Managing Cloud Security (JY02)

Last Update Nov 30, 2025
Total Questions : 80

We are offering FREE Managing-Cloud-Security WGU exam questions. All you do is to just go and sign up. Give your details, prepare Managing-Cloud-Security free exam questions and then go for complete pool of WGU Managing Cloud Security (JY02) test questions that will help you more.

Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$36.75  $104.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$43.75  $124.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$57.75  $164.99
Questions 1

Which methodology encompasses conducting tests around the interaction of end users with new code that is intended for a patch?

Options:

A.  

Full testing

B.  

Nonfunctional testing

C.  

Tabletop testing

D.  

Functional testing

Discussion 0
Questions 2

A group of DevOps engineers adopted the network-as-code methodology to manage network infrastructure. During a code release, the engineers find a bug that is causing issues on a production site. Which safeguard will allow the engineers to restore functionality to the production site?

Options:

A.  

Staging

B.  

Code review

C.  

Code testing

D.  

Rollback

Discussion 0
Questions 3

A governmental data storage organization plans to relocate its primary North American data center to a new property with larger acreage. Which defense should the organization deploy at this location to prevent vehicles from causing harm to the data center?

Options:

A.  

Locks

B.  

Cameras

C.  

Bollards

D.  

Fences

Discussion 0
Questions 4

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.  

Change

B.  

Error

C.  

Disruption

D.  

Bug

Discussion 0
Questions 5

Which component allows customers to transfer data into and out of a cloud computing vendor’s environment?

Options:

A.  

Firewall

B.  

Virtual display

C.  

Network

D.  

Load balancer

Discussion 0
Questions 6

Which testing standard is currently used to guide Service Organization Control (SOC) audits outside the United States?

Options:

A.  

The Statement on Standards for Attestation Engagements (SSAE) 18

B.  

The International Standard on Review Engagements (ISRE) 2400

C.  

The Statement on Standards for Accounting and Review Services (SSARS) 25

D.  

The International Standard on Assurance Engagements (ISAE) 3402

Discussion 0
Questions 7

Which tool should a developer use to describe the requirements they have gathered for a code improvement they are tasked with making as part of a current release?

Options:

A.  

Cases

B.  

Stories

C.  

Cookies

D.  

Notes

Discussion 0
Questions 8

Which activity is within the scope of the cloud provider’s role in the chain of custody?

Options:

A.  

Setting data backup and recovery policies

B.  

Collecting and preserving digital evidence

C.  

Initiating and executing incident response

D.  

Classifying and analyzing data

Discussion 0
Questions 9

Which data destruction technique involves encrypting the data, followed by encrypting the resulting keys with a different engine, and then destroying the keys resulting from the second encryption round?

Options:

A.  

One-way hashing

B.  

Degaussing

C.  

Overwriting

D.  

Cryptographic erasure

Discussion 0
Questions 10

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.  

Automatic expiration

B.  

Dynamic policy control

C.  

Persistent protection

D.  

Continuous auditing

Discussion 0
Questions 11

Which design pillar encompasses the ability to support development and run workloads effectively, gain insights into operations, and continuously improve supporting processes to deliver business value?

Options:

A.  

Performance efficiency

B.  

Operational excellence

C.  

Reliability

D.  

Sustainability

Discussion 0
Questions 12

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

Options:

A.  

Continuous monitoring

B.  

Confidential computing

C.  

Regulatory oversight

D.  

Incident management

Discussion 0
Questions 13

An organization is considering using vendor-specific application programming interfaces (APIs) and internal tools to set up a new service. However, the engineers are against this plan and are advocating for a new policy to prevent issues that could arise. Which common concern in cloud applications are the engineers concerned about?

Options:

A.  

Reliability

B.  

Scalability

C.  

Portability

D.  

Availability

Discussion 0
Questions 14

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.  

Authorization

B.  

Web application firewall (WAF)

C.  

Antispyware program

D.  

Authentication

Discussion 0
Questions 15

Which tool provides a dedicated environment to contain and analyze malware?

Options:

A.  

Encryption

B.  

Gateway

C.  

Sandbox

D.  

Controller

Discussion 0
Questions 16

An organization creates a plan for long-term cloud storage of its backup data. What should the organization address to avoid losing access to its data?

Options:

A.  

Quantum computing

B.  

Change tracking

C.  

Key management

D.  

Regulatory compliance

Discussion 0
Questions 17

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.  

Key revocation

B.  

Physical destruction

C.  

Overwriting

D.  

Degaussing

Discussion 0
Questions 18

Which term describes data elements that, when combined with other information, are used to single out an individual?

Options:

A.  

Direct identifiers

B.  

Data subjects

C.  

Personal details

D.  

Indirect identifiers

Discussion 0
Questions 19

Developers need to be aware of a common application programming interface (API) threat that occurs when attackers send malicious code through a form input to a web application so that it may then be executed. Which type of attack represents this API threat?

Options:

A.  

On-path

B.  

Injection

C.  

Credential

D.  

Denial-of-service

Discussion 0
Questions 20

Which characteristic of cloud computing refers to sharing physical assets among multiple customers?

Options:

A.  

Rapid scalability

B.  

On-demand self-service

C.  

Resource pooling

D.  

Measured service

Discussion 0
Questions 21

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.  

Authorization

B.  

Web application firewall (WAF)

C.  

Access control list (ACL)

D.  

Authentication

Discussion 0
Questions 22

A customer service representative needs to verify a customer's private information, but the representative does not need to see all the information. Which technique should the service provider use to protect the privacy of the customer?

Options:

A.  

Hashing

B.  

Encryption

C.  

Masking

D.  

Tokenization

Discussion 0
Questions 23

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.  

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.  

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.  

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.  

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Discussion 0
Questions 24

A user creates new financial documents that will be stored in the cloud. Which action should the user take before uploading the documents to protect them against threats such as packet capture and on-path attacks?

Options:

A.  

Hashing

B.  

Encryption

C.  

Change tracking

D.  

Metadata labeling

Discussion 0