Spring Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

WGU Managing Cloud Security (JY02, GZO1) Question and Answers

WGU Managing Cloud Security (JY02, GZO1)

Last Update Feb 28, 2026
Total Questions : 204

We are offering FREE Managing-Cloud-Security WGU exam questions. All you do is to just go and sign up. Give your details, prepare Managing-Cloud-Security free exam questions and then go for complete pool of WGU Managing Cloud Security (JY02, GZO1) test questions that will help you more.

Managing-Cloud-Security pdf

Managing-Cloud-Security PDF

$36.75  $104.99
Managing-Cloud-Security Engine

Managing-Cloud-Security Testing Engine

$43.75  $124.99
Managing-Cloud-Security PDF + Engine

Managing-Cloud-Security PDF + Testing Engine

$57.75  $164.99
Questions 1

Which technique is used to count source and destination internet protocol (IP) addresses in incoming log flow across all log sources?

Options:

A.  

Software error

B.  

Frequency

C.  

Time

D.  

Baseline

Discussion 0
Questions 2

Which cloud infrastructure component employs a hierarchical and distributed database that contains mappings?

Options:

A.  

Transport Layer Security (TLS)

B.  

Domain Name System (DNS)

C.  

Clustered hosting

D.  

Resource sharing

Discussion 0
Questions 3

When should a cloud service provider delete customer data?

Options:

A.  

When the cloud provider oversubscribes its storage space

B.  

When the data has not been accessed in the last 30 days

C.  

After a scheduled data review

D.  

After the specified retention period

Discussion 0
Questions 4

Which description accurately characterizes the movement of applications to the cloud?

Options:

A.  

In a desktop as a service (DaaS) environment, the customer is responsible for securing the underlying infrastructure.

B.  

In an infrastructure as a service (IaaS) environment, the CSP is responsible for securing the platform.

C.  

In a platform as a service (PaaS) environment, the customer is responsible for securing the underlying infrastructure.

D.  

In a software as a service (SaaS) environment, the CSP is responsible for securing the platform.

Discussion 0
Questions 5

Which option should a cloud architect recommend to an organization looking to simplify development and management of applications?

Options:

A.  

Desktop as a Service (DaaS)

B.  

Infrastructure as a Service (IaaS)

C.  

Platform as a Service (PaaS)

D.  

Software as a Service (SaaS)

Discussion 0
Questions 6

Which type of data sanitization should be used to destroy data on a USB thumb drive while keeping the drive intact?

Options:

A.  

Key revocation

B.  

Physical destruction

C.  

Overwriting

D.  

Degaussing

Discussion 0
Questions 7

Which approach helps prepare for common application vulnerabilities that developers are likely to encounter when working with cloud applications?

Options:

A.  

Sandboxing

B.  

Threat modeling

C.  

Application virtualization

D.  

Multitenancy

Discussion 0
Questions 8

Which open-source software (OSS) cloud computing platform provides a full set of features and components for a cloud environment?

Options:

A.  

Apache OpenStack

B.  

Hypervisor

C.  

VMware vSphere

D.  

Open Web Application Security Project

Discussion 0
Questions 9

Which guide remedies the challenge of the international nature of cloud forensics and is known for becoming the premier standard for eDiscovery?

Options:

A.  

ISO/IEC 27042:2015

B.  

ISO/IEC 27041:2015

C.  

ISO/IEC 27050-1:2016

D.  

ISO/IEC 27037:2012

Discussion 0
Questions 10

Which technology prevents the environment from being over-controlled with performance-degrading security measures for applications?

Options:

A.  

Quality of Service (QoS)

B.  

Distributed Denial of Service (DDoS)

C.  

Intrusion Detection System (IDS)

D.  

Runtime Application Self-Protection (RASP)

Discussion 0
Questions 11

An organization wants to track how often a file is accessed and by which users. Which information rights management (IRM) solution should the organization implement?

Options:

A.  

Automatic expiration

B.  

Dynamic policy control

C.  

Persistent protection

D.  

Continuous auditing

Discussion 0
Questions 12

Which cloud platform detection and analysis methodology can be performed to determine whether other similar instances were potentially exposed during the same attack?

Options:

A.  

Reviewing application logs

B.  

Examining network flows

C.  

Reviewing log data

D.  

Examining configuration data

Discussion 0
Questions 13

Under which jurisdiction do General Data Protection Regulation (GDPR) guidelines apply?

Options:

A.  

China

B.  

European Union

C.  

Australia

D.  

United States of America

Discussion 0
Questions 14

Which data source provides auditability and traceability for event investigation as well as documentation?

Options:

A.  

Block storage

B.  

Object storage

C.  

Database logs

D.  

Database rows

Discussion 0
Questions 15

An organization experienced an unplanned event. As a result, the customers using the web application face a loss of service. What does the incident generated in this situation seek to resolve?

Options:

A.  

Change

B.  

Error

C.  

Disruption

D.  

Bug

Discussion 0
Questions 16

Which country lacks a national law assuring individual personal privacy?

Options:

A.  

New Zealand

B.  

Canada

C.  

United States

D.  

Israel

Discussion 0
Questions 17

Which security information and event management concept focuses on account and service hijacking issues?

Options:

A.  

Digital forensics

B.  

Trust

C.  

Lightweight Directory Access Protocol

D.  

Access control

Discussion 0
Questions 18

Which cloud storage architecture enhances the opportunity for data policy enforcement such as data loss prevention (DLP)?

Options:

A.  

Object

B.  

Flash

C.  

Database

D.  

Ephemeral

Discussion 0
Questions 19

Which cloud computing characteristic allows consumers to expand or contract required resources automatically?

Options:

A.  

Measured service

B.  

Resource pooling

C.  

On-demand self-service

D.  

Rapid elasticity

Discussion 0
Questions 20

Which cloud storage architecture allows the digital rights management (DRM) solutions to associate metadata with the materials in storage?

Options:

A.  

Object-based

B.  

Volume

C.  

Relational database

D.  

File

Discussion 0
Questions 21

An organization is concerned that it will be unable to recover or access data if the cloud provider goes into bankruptcy and leaves the market. How is this concern addressed in a business continuity and disaster recovery plan?

Options:

A.  

Consider options for portability and interoperability

B.  

Enable multiple zones to mitigate service disruptions

C.  

Revise contractual and personnel obligations

D.  

Use best tools to securely connect to the cloud

Discussion 0
Questions 22

Which security measure controls virtualization in the cloud?

Options:

A.  

Monitoring and logging

B.  

Using a dedicated hosting

C.  

Managing image assets

D.  

Securing the hypervisor

Discussion 0
Questions 23

Which requirement for cross-border data transfer is part of the General Data Protection Regulation (GDPR)?

Options:

A.  

Acceptance of liability for protection by the transferring entity

B.  

Acknowledgement of liability for protection by the entity receiving the data transfer

C.  

Demonstration of adequate level of protection similar to GDPR

D.  

Formal consent of the data owner

Discussion 0
Questions 24

Which security strategy is associated with data rights management solutions?

Options:

A.  

Persistent protection

B.  

Multilevel aggregation

C.  

Enhanced detail

D.  

Unexpired digital content

Discussion 0
Questions 25

Why must the software agent management plane of the workload security control support auto-scaling and elasticity?

Options:

A.  

Long-running VMs that still run standard security controls may be isolated on the network.

B.  

They are locked down more than the usual servers and tend to run a smaller set of services.

C.  

The traditional tools are not normally designed for that degree of velocity.

D.  

Some agents require opening additional firewall ports, which increases the network attack surface.

Discussion 0
Questions 26

Which steps should an organization take to avoid risk when dealing with software licensing?

Options:

A.  

It should ensure it has the correct type of license.

B.  

It should ensure it has the correct location to store licenses.

C.  

It should ensure it only uses closed-source licenses.

D.  

It should ensure it only uses open-source licenses.

Discussion 0
Questions 27

An organization is implementing a new hybrid cloud deployment. Before granting access to any of the resources, the security team wants to ensure that all employees are checked against a database to see if they are allowed to access the requested resource. Which type of security control is the organization leveraging for its employees?

Options:

A.  

Authorization

B.  

Web application firewall (WAF)

C.  

Antispyware program

D.  

Authentication

Discussion 0
Questions 28

Which key cloud computing technology meters what is provided and ensures consumers only use what is allotted?

Options:

A.  

Measured service

B.  

Business impact analysis

C.  

Subscription-based services

D.  

Resource pooling

Discussion 0
Questions 29

How does a cloud-based distributed denial-of-service (DDoS) protection strategy help in the event of an attack?

Options:

A.  

Using round-robin load balancing

B.  

Rerouting traffic to the mitigation services

C.  

Having multiple endpoints

D.  

Scaling the receiving application

Discussion 0
Questions 30

Which action should be taken to preserve forensic evidence for collection?

Options:

A.  

Implementing serverless architectures

B.  

Enabling threat modeling

C.  

Pausing the virtual machine

D.  

Enforcing mutable servers

Discussion 0
Questions 31

A customer requests that a cloud provider physically destroys any drives storing their personal data. What must the provider do with the drives?

Options:

A.  

It should destroy them only if the contract includes hardware disposal insurance.

B.  

It should use cryptographic erasure to securely remove any personal data from the drives.

C.  

It should destroy them only if dedicated hardware disposal is specified in the contract.

D.  

It should use degaussing tools to securely remove any personal data from the drives.

Discussion 0
Questions 32

Which strategy will reduce the impact of risk in the business continuity and disaster recovery planning process?

Options:

A.  

Insurance

B.  

Avoidance

C.  

Mitigation

D.  

Acceptance

Discussion 0
Questions 33

Which type of disaster recovery plan (DRP) test requires the whole organization to participate in a scheduled disaster scenario without performing all of the actual tasks?

Options:

A.  

Tabletop

B.  

Dry run

C.  

Parallel

D.  

Full

Discussion 0
Questions 34

Which characteristic could affect the audit process for a customer of a cloud service provider?

Options:

A.  

Lack of physical access to the cloud infrastructure

B.  

Utilization constraints on the bandwidth imposed by the cloud service vendor

C.  

Limits for up-time of the hosted system

D.  

Restrictions on the data storage options offered by the cloud service provider

Discussion 0
Questions 35

An organization is evaluating which cloud computing service model it should implement. It is considering either platform as a service (PaaS) or software as a service (SaaS). Which risk associated with SaaS can the organization avoid by choosing PaaS?

Options:

A.  

Vendor lock-out

B.  

Vendor lock-in

C.  

Personnel threat

D.  

Natural disaster

Discussion 0
Questions 36

Which design component contains both a remotely accessible application programming interface (API) and a web graphical user interface?

Options:

A.  

Infrastructure

B.  

Management

C.  

Applistructure

D.  

Metastructure

Discussion 0
Questions 37

Which group should be notified for approval when a planned modification to an environment is scheduled?

Options:

A.  

Event management team

B.  

Problem management team

C.  

Change management board

D.  

Executive management board

Discussion 0
Questions 38

An organization is reviewing a contract from a cloud service provider and wants to ensure that all aspects of the contract are adhered to by the cloud service provider. Which control will allow the organization to verify that the cloud provider is meeting its obligations?

Options:

A.  

Continuous monitoring

B.  

Confidential computing

C.  

Regulatory oversight

D.  

Incident management

Discussion 0
Questions 39

Which risk may be faced by users when using software resources in the platform as a service (PaaS) cloud model?

Options:

A.  

Guest escape

B.  

Information bleed

C.  

Software interoperability

D.  

Web application security

Discussion 0
Questions 40

Which security device allows customers to redirect traffic?

Options:

A.  

Security information and event management

B.  

Intrusion detection and prevention systems

C.  

Web application firewalls

D.  

Cryptographic key management

Discussion 0
Questions 41

A cloud provider that processes third-party credit card payments is unable to encrypt its customers' cardholder data because of constraints on a legacy payment processing system. What should it implement to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance?

Options:

A.  

Privacy control

B.  

Protection levels

C.  

Risk acceptance

D.  

Compensating control

Discussion 0
Questions 42

What is a risk in using the community cloud over the private cloud?

Options:

A.  

Lack of virtual instances

B.  

Loss of policy control

C.  

Loss of trained personnel

D.  

Lack of physical resources

Discussion 0
Questions 43

Which regulation provides a guide for implementing the risk management framework?

Options:

A.  

NIST SP 800-37

B.  

ISO 31000:2009

C.  

ISO 27001

D.  

PCI-DSS

Discussion 0
Questions 44

After selecting a new vendor, what should an organization do next as part of the vendor onboarding process?

Options:

A.  

It should terminate the relationship with the vendor and dissolve technical agreements, data transfers, and other connections with the vendor.

B.  

It should monitor the practices of the vendor by performing audits and confirming that the vendor is meeting its contractual agreements.

C.  

It should evaluate and determine whether the vendor meets the organization's requirements by evaluating its security policies.

D.  

It should confirm contractual details and arrange other details such as technical agreements, data transfers, and encryption standards with the vendor.

Discussion 0
Questions 45

In which service model would the cloud service provider bear the greatest responsibility for security?

Options:

A.  

Database as a Service (DBaaS)

B.  

Software as a Service (SaaS)

C.  

Platform as a Service (PaaS)

D.  

Infrastructure as a Service (IaaS)

Discussion 0
Questions 46

Which design principle of secure cloud computing ensures that users have access to a large number of resources that grow based on user demand?

Options:

A.  

Resource pooling

B.  

Collaboration

C.  

Virtualization

D.  

Rapid elasticity

Discussion 0
Questions 47

Which privacy issue does the Clarifying Lawful Overseas Use of Data (CLOUD) Act address?

Options:

A.  

Conflicting regulations in different jurisdictions

B.  

Collection and use of genetic information

C.  

Data breach notification requirements

D.  

Use of digital surveillance by multinational employers

Discussion 0
Questions 48

Which risk mitigation technique will compensate a cloud service customer for failures on the part of the cloud service provider?

Options:

A.  

Recovery time objective

B.  

Data protection requirements

C.  

SLA penalties

D.  

Suspension of service clause

Discussion 0
Questions 49

Which security issue can be found only through dynamic application security testing (DAST)?

Options:

A.  

Code quality

B.  

Null pointer dereference

C.  

Insecure cryptographic function

D.  

Runtime privileges

Discussion 0
Questions 50

Which cloud infrastructure risk is the responsibility of the cloud provider?

Options:

A.  

Physical security

B.  

Data security

C.  

Application security

D.  

Security governance

Discussion 0
Questions 51

Which entity provides common directory services?

Options:

A.  

Remote Authentication Dial-In User Service

B.  

Terminal Access Controller Access-Control System

C.  

Domain Name System

D.  

Lightweight Directory Access Protocol

Discussion 0
Questions 52

Which security concept requires continuous identity and authorization checks to allow access to data?

Options:

A.  

Traffic inspection

B.  

Zero trust

C.  

Intrusion prevention

D.  

Secret management

Discussion 0
Questions 53

Which type of service allows an organization to maximize control of its information?

Options:

A.  

Infrastructure as a Service (IaaS)

B.  

Platform as a Service (PaaS)

C.  

Desktop as a Service (DaaS)

D.  

Software as a Service (SaaS)

Discussion 0
Questions 54

An organization wants to secure the boundary between a lower-security zone and a higher-security zone. Which security measure should it use?

Options:

A.  

Virtual client

B.  

Secure Shell

C.  

Bastion host

D.  

Host isolation

Discussion 0
Questions 55

An organization is implementing a new hybrid cloud deployment and wants all employees to provide a username, password, and security token before accessing any of the cloud resources. Which type of security control is the organization leveraging for its employees?

Options:

A.  

Authorization

B.  

Web application firewall (WAF)

C.  

Access control list (ACL)

D.  

Authentication

Discussion 0
Questions 56

Which factor is a primary consideration when analyzing the legal and privacy implications of using cloud technologies?

Options:

A.  

Jurisdiction of the cloud provider and users

B.  

Level of encryption that the cloud solution provides

C.  

Configuration details specified in the contract

D.  

Penalties specified in the service level agreement

Discussion 0
Questions 57

An organization that primarily uses a remote work model is reviewing the documentation of various insurance providers to become eligible for cybersecurity insurance. Competitive insurance providers require the organization to implement security controls to ensure only authorized personnel can access the network, data, emails, and other administrative information. Which commonly required control should the organization implement before applying for cybersecurity insurance from these competitive insurance providers?

Options:

A.  

Network segmentation

B.  

Application whitelisting

C.  

Multifactor authentication (MFA)

D.  

Trusted platform module (TPM)

Discussion 0
Questions 58

Which item must be examined in detail when evaluating the risks associated with a new software as a service (SaaS) solution?

Options:

A.  

Use of low-level accounts for administrative tasks

B.  

Leverage of multi-factor authentication for all cloud access

C.  

Historical availability of services

D.  

Maintenance releases or patches to install

Discussion 0
Questions 59

An organization’s security architects determined that all authentication and authorization requests need to be validated before any employee can access corporate resources. Because of this, the organization needs to implement a system that stores and manages the employees' credential information and then validates any requests sent. Which system would allow the organization to meet the architects' requirements?

Options:

A.  

Hardware security module (HSM)

B.  

Zero trust

C.  

Bastion host

D.  

Identity provider (IdP)

Discussion 0
Questions 60

An organization needs to provide space where security administrators can centrally monitor network traffic and events and respond to threats or outages. What should the organization create?

Options:

A.  

Emergency response team (ERT)

B.  

Security operations center (SOC)

C.  

Disaster response team (DRT)

D.  

Network operations center (NOC)

Discussion 0
Questions 61

A network administrator is concerned about the loss of physical control when moving data to the cloud. Which countermeasure should be implemented to avoid this threat?

Options:

A.  

Multi-layer control

B.  

Tertiary control

C.  

Ancillary control

D.  

Compensating control

Discussion 0