|Managing Cloud Security (Latest Update
) Questions & Answers |
Grade A | 100% Correct
Business Impact Analysis (BIA)
A process that assesses and identifies the potential effects of disruptions to a business operation.
SPOF
A component or system that, if it fails, will cause the entire system to fail.
Quantitative
Risk assessment that uses specific numerical values
Qualitative
Risk assessment that uses non-numerical categories that are relative in nature, such as high,
medium, and low.
Risk appetite
level, amount, or type of risk that the organization finds acceptable
, WGU D320 Exam Version (JYO2)
|Managing Cloud Security (Latest Update
) Questions & Answers |
Grade A | 100% Correct
Residual risk
The remaining risk that exists after countermeasures have been applied.
IaaS
Service model where cloud customer has the most responsibility and authority. Cloud provider is
only liable for the underlying hardware.
PaaS
Service model where cloud customer loses more control because the cloud provider is
responsible for installing, maintaining, and administering the OS as well as underlying hardware.
SaaS
Service model where cloud customer loses all control of the environment. Cloud provider is
responsible for all of the underlying hardware and software.
Homomorphic encryption
A method of processing data in the cloud while it remains encrypted.
Defense in depth
, WGU D320 Exam Version (JYO2)
|Managing Cloud Security (Latest Update
) Questions & Answers |
Grade A | 100% Correct
A security strategy that involves implementing multiple overlapping layers of security measures
to protect an environment.
Data owner
Organization that has collected or created the data.
Data Custodian
Person or entity that is tasked with the daily maintenance and administration of the data.
Data Processor
Any org or person who manipulates, stores, or moves the data on behalf of the data owner
Data discovery
The process of creating an inventory or conducting e-discovery to identify and locate data.
Label-based discovery
A data discovery method that is aided by labels created by the data owner.
, WGU D320 Exam Version (JYO2)
|Managing Cloud Security (Latest Update
) Questions & Answers |
Grade A | 100% Correct
Metadata-based discovery
A data discovery method that involves discovering data using metadata traits and characteristics.
Content-based discovery
Refers to finding information or resources based on their characteristics, attributes, or content
rather than relying on predefined keywords or categories.
Structured data
Data that is organized and formatted in a way that is easily searchable and can be processed by
computers.
Unstructured data
qualitative data; natural-language text; incorporate media (audio, video, images); contains JSON,
XML, binary objects (images encoded as text strings); important for data analytic strategies;
noSQL
IRM (Information Rights Management)
A set of controls and technologies used to protect certain types of assets, such as intellectual
property or sensitive information.