Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D320 MANAGING CLOUD SECURITY | 80 Question Version JYO2 | Latest January | Already Passed | Cloud Security Exam | Pass Guaranteed - A+ Graded

Rating
-
Sold
-
Pages
31
Grade
A+
Uploaded on
31-03-2026
Written in
2025/2026

Pass WGU D320 Managing Cloud Security on your first attempt with this comprehensive 80-question JYO2 guide featuring the latest January updates! This A+ Graded resource for the Western Governors University (WGU) D320 Managing Cloud Security Exam contains verified questions with correct answers covering all essential cloud security concepts tested in the JYO2 version. Featuring comprehensive coverage of cloud computing concepts and architectures, cloud security frameworks (CSA CCM, NIST 800-144, 800-145) , identity and access management (IAM) in the cloud, infrastructure security (compute, storage, networking) , data protection and encryption, incident response in cloud environments, compliance and legal considerations (GDPR, HIPAA, FedRAMP) , cloud governance and risk management, DevSecOps and secure CI/CD pipelines, container security (Docker, Kubernetes) , serverless security, cloud security posture management (CSPM) , and shared responsibility model, it provides the exact practice needed to master the official WGU D320 assessment. With detailed rationales, real-world cloud security scenarios, AWS/Azure/GCP security applications, and our Pass Guarantee, this is the definitive tool for WGU students seeking to complete their Managing Cloud Security course with confidence. Download now and pass D320 with ease!

Show more Read less
Institution
WGU D320 MANAGING CLOUD SECURITY
Course
WGU D320 MANAGING CLOUD SECURITY

Content preview

​ GU D320 MANAGING CLOUD​
W
​SECURITY | 80 Question Version JYO2 |​
​Latest January 2025-2026 | Already Passed​
​| Cloud Security Exam | Pass Guaranteed -​
​A+ Graded​
​**[DOMAIN 1: CLOUD COMPUTING CONCEPTS & ARCHITECTURE - 12 Questions]**​

*​ *Question 1**​
​In the shared responsibility model for Infrastructure as a Service (IaaS), which security​
​responsibility falls primarily on the customer?​

​ ) Physical data center security and hypervisor maintenance​
A
​B) Network infrastructure and storage virtualization​
​C) Operating system patching and application security​
​D) Power supply and cooling systems​

​**[CORRECT]** C) Operating system patching and application security​

*​ *Rationale:** In the IaaS shared responsibility model, the cloud provider manages the physical​
​infrastructure, network, and virtualization layer (hypervisor). The customer is responsible for the​
​guest operating system, middleware, applications, data, and access management. This​
​represents the highest level of customer responsibility among cloud service models. Options A,​
​B, and D describe provider responsibilities.​

*​ *Question 2**​
​Which cloud deployment model provides dedicated infrastructure for a single organization while​
​still leveraging cloud computing characteristics?​

​ ) Public cloud​
A
​B) Private cloud​
​C) Community cloud​
​D) Hybrid cloud​

​**[CORRECT]** B) Private cloud​

,*​ *Rationale:** A private cloud is provisioned for exclusive use by a single organization. It offers​
​greater control, customization, and security compared to public cloud while maintaining cloud​
​characteristics like self-service and elasticity. Public cloud (A) is shared infrastructure,​
​community cloud (C) is shared by organizations with common concerns, and hybrid cloud (D)​
​combines multiple deployment models.​

*​ *Question 3**​
​A company wants to deploy a web application without managing the underlying infrastructure,​
​operating system, or middleware. They need to focus solely on application configuration and​
​data. Which cloud service model best fits this requirement?​

​ ) Infrastructure as a Service (IaaS)​
A
​B) Platform as a Service (PaaS)​
​C) Software as a Service (SaaS)​
​D) Function as a Service (FaaS)​

​**[CORRECT]** C) Software as a Service (SaaS)​

*​ *Rationale:** SaaS provides fully functional applications where the provider manages​
​everything except customer data and access. The customer simply configures and uses the​
​application. IaaS (A) requires OS and application management, PaaS (B) requires application​
​development and deployment management, and FaaS/D (serverless) still requires code​
​deployment though infrastructure is abstracted.​

*​ *Question 4**​
​According to the Cloud Security Alliance (CSA) Top Threats, which of the following represents​
​the highest risk to cloud environments?​

​ ) Natural disasters affecting data center locations​
A
​B) Misconfiguration and inadequate change control​
​C) Hardware failure of storage devices​
​D) Insufficient bandwidth for cloud connectivity​

​**[CORRECT]** B) Misconfiguration and inadequate change control​

*​ *Rationale:** CSA consistently ranks misconfiguration and inadequate change control as the​
​top cloud security threat. This includes exposed storage buckets, improper security group rules,​
​and lack of change management. Cloud providers handle physical risks (A, C) through​
​redundancy, and bandwidth (D) is an operational rather than security concern.​

*​ *Question 5**​
​What is the primary security risk associated with VM escape attacks?​

​A) Unauthorized access to the hypervisor and other VMs on the same host​

,​ ) Data corruption within the virtual machine's own storage​
B
​C) Network latency between virtual machines​
​D) Inability to migrate VMs between physical hosts​

​**[CORRECT]** A) Unauthorized access to the hypervisor and other VMs on the same host​

*​ *Rationale:** VM escape is an attack where a malicious VM breaks out of its isolated​
​environment to access the host hypervisor, potentially compromising all other VMs on that host.​
​This violates the fundamental isolation guarantee of virtualization. Options B, C, and D describe​
​issues that do not represent the critical security impact of hypervisor compromise.​

*​ *Question 6**​
​Which characteristic of cloud computing enables rapid elasticity and appears to provide​
​unlimited resources to the consumer?​

​ ) Resource pooling​
A
​B) Broad network access​
​C) Measured service​
​D) On-demand self-service​

​**[CORRECT]** A) Resource pooling​

*​ *Rationale:** Resource pooling allows the provider's computing resources to serve multiple​
​consumers using a multi-tenant model, with resources dynamically assigned and reassigned​
​according to demand. This pooling enables the illusion of infinite capacity and supports rapid​
​elasticity. While D enables provisioning, A specifically enables the scalability characteristic.​

*​ *Question 7**​
​In a Platform as a Service (PaaS) model, which component is the cloud provider responsible for​
​securing?​

​ ) Customer-developed applications​
A
​B) Customer data stored in the application​
​C) Operating system and runtime environment​
​D) User access credentials and authentication methods​

​**[CORRECT]** C) Operating system and runtime environment​

*​ *Rationale:** In PaaS, the provider manages the underlying infrastructure, operating system,​
​middleware, and runtime environment. The customer manages their applications (A), data (B),​
​and access control (D). This intermediate shared responsibility model reduces customer burden​
​compared to IaaS while offering more control than SaaS.​

​**Question 8**​

, ​What is "VM sprawl" and why is it a security concern?​

​ ) The uncontrolled proliferation of virtual machines leading to management and security gaps​
A
​B) The physical spreading of virtual machines across multiple data centers​
​C) The rapid scaling of a single virtual machine to consume excessive resources​
​D) The migration of virtual machines between hypervisors without authorization​

*​ *[CORRECT]** A) The uncontrolled proliferation of virtual machines leading to management​
​and security gaps​

*​ *Rationale:** VM sprawl occurs when VMs are created without proper lifecycle management,​
​leading to orphaned instances, outdated patches, unknown configurations, and security blind​
​spots. Unlike physical servers, VMs are easily created, making governance essential. Options​
​B, C, and D describe different virtualization phenomena.​

*​ *Question 9**​
​Which cloud computing essential characteristic allows consumers to unilaterally provision​
​computing capabilities without requiring human interaction with service providers?​

​ ) Broad network access​
A
​B) On-demand self-service​
​C) Rapid elasticity​
​D) Measured service​

​**[CORRECT]** B) On-demand self-service​

*​ *Rationale:** On-demand self-service is the essential characteristic that enables consumers to​
​automatically provision resources (servers, storage, network) as needed without human​
​provider interaction. This distinguishes cloud from traditional IT provisioning. While A refers to​
​accessibility, C to scaling, and D to metering, B specifically addresses automatic provisioning​
​capability.​

*​ *Question 10**​
​A multinational corporation wants to maintain sensitive data on-premises while leveraging public​
​cloud for less sensitive workloads. Which deployment model should they implement?​

​ ) Private cloud only​
A
​B) Public cloud only​
​C) Hybrid cloud​
​D) Community cloud​

​**[CORRECT]** C) Hybrid cloud​

Written for

Institution
WGU D320 MANAGING CLOUD SECURITY
Course
WGU D320 MANAGING CLOUD SECURITY

Document information

Uploaded on
March 31, 2026
Number of pages
31
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
oketchnyasakwa

Get to know the seller

Seller avatar
oketchnyasakwa Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 months
Number of followers
0
Documents
223
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions