Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA QUESTIONS AND ANSWERS-GRADED A

Beoordeling
-
Verkocht
-
Pagina's
36
Cijfer
A+
Geüpload op
22-04-2026
Geschreven in
2025/2026

WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA QUESTIONS AND ANSWERS-GRADED A

Instelling
D027
Vak
D027

Voorbeeld van de inhoud

WGU C838 MANAGING CLOUD SECURITY
FINAL EXAM OA QUESTIONS AND
ANSWERS-GRADED A


1) You are the security subject matter expert (SME) for an organization
considering a transition from the legacy environment into a hosted cloud
provider 's data center. One of the challenges you 're facing is whether the cloud
provider will be able to comply with the existing legislative and contractual
frameworks your organization is required to follow. This is a issue.

a. Resiliency
b. Privacy
c.
Performance
d. Regulatory - ANSWER- D

2. You are the security subject matter expert (SME) for an organization
considering a transition from the legacy environ ment into a hosted cloud provider
's data
center. One of the challenges you 're facing is whether the cloud provider will be
able to allow your organization to substantiate and determine with some assurance
that all of the contract terms are being met. This is a(n) issue.
b. Privacy
a. Regulatory
c. Resiliency
d. Auditability - ANSWER- D



3. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction that
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. K ey length variances don 't provide any actual additional security.
b. It would cause additional processing overhead and time delay.

,c. It might result in vendor lockout.
d. The data subjects might be upset by this. - ANSWER- B

4. Encryption is an essential tool for affording security to cloud-based operations.
While it is possible to encrypt every system, piece of data, and transaction tha
takes place on the cloud, why might that not be the optimum choice for an
organization?
a. It could increase the possibility of physical
theft.
b. Encryption won 't work throughout the
environment.
c. The protection might be disproportionate to the value of the asset(s).
d. Users will be able to see everything within the organization. - ANSWER- C

5. Which of the following is not an element of the identification component of
identity and access management (IAM)?
a. Provisioning
b. Management
c. Discretion
d. Deprovisioning - ANSWER- C

6. Which of the following entities is most likely to play a vital role in the identity
provisioning aspect of a user 's experience in an organization?
a. The accounting department
b. The human resources (HR) office
c. The maintenance team
d. The purchasing office - ANSWER- B

7. Why is the deprovisioning element of the identification component of
identity and access management (IAM) so important? a. Extra accounts cost so
much extra money.
b. Open but unassigned accounts are vulnerabilities.
c. User tracking is essential to
d. Encryption has to be maintained. - ANSWER- B
performance.

8. All of the following are reasons to perform review and maintenance actions
on user accounts except .
a. To determine whether the user still needs the same access

,b. To determine whether the user is still with the organization
c. To determine whether the data set is still applicable to the user 's role
d. To determine whether the user is still performing well - ANSWER- D

9. Who should be involved in review and maintenance of user accounts/access?
a. The user 's manager
b. The security manager
c. The accounting department
d. The incident response team - ANSWER- A

10. Which of the following protocols is most applicable to the
identification process aspect of identity and access management (IAM)?
a. Secure Sockets Layer (SSL)
b. Internet Protocol security (IPsec)
c. Lightweight Directory Access Protocol (LDAP)
d. Amorphous ancillary data transmission (AADT) - ANSWER- C

11. Privileged user (administrators, managers, and so forth) accounts need to
be reviewed more closely than basic user accounts. Why is this? a. Privileged
users have more encryption keys.
b. Regular users are more trustworthy.
c. There are extra controls on privileged user
d. Privileged users can cause more damage to the organization. - ANSWER- D
accounts.

12. The additional review activities that might be performed for privileged
user accounts could include all of the following except . a. Deeper personnel
background checks
b. Review of personal financial accounts for privileged users
c. More frequent reviews of the necessity for access
d. Pat-down checks of privileged users to deter against physical theft - ANSWER-
D

13. If personal financial account reviews are performed as an additional review
control for privileged users, which of the following characteristics is least likely
to be a useful indicator for review purposes? a. Too much money in the account
b. Too little money in the account
c. The bank branch being used by the privileged user

, d. Specific senders/recipients - ANSWER- C

14. How often should the accounts of privileged users be reviewed? a.
Annually
b. Twice a year
c. Monthly
d. More often than regular user account reviews - ANSWER- D

15. Privileged user account access should be .
a. Temporary
b. Pervasive
c. Thorough
d. Granular - ANSWER- A

16. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According
to the CSA 's Notorious Nine list, data breaches can be . a. Overt or
covert
b. International or subterranean
c. From internal or external sources
d. Voluminous or specific - ANSWER- C

17. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According to
the CSA, an organization that operates in the cloud environment and suffers a
data breach may be required to . a. Notify affected users
b. Reapply for cloud service
c. Scrub all affected physical memory
d. Change regulatory frameworks - ANSWER- A

18. The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of
common threats to organizations participating in cloud computing. According
to the CSA, an organization that suffers a data breach might suffer all of the
following negative effects except . a. Cost of compliance with
notification laws
b. Loss of public perception/goodwill
c. Loss of market share

Geschreven voor

Instelling
D027
Vak
D027

Documentinformatie

Geüpload op
22 april 2026
Aantal pagina's
36
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$24.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
ALVINK2022 University of Oxford
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
254
Lid sinds
4 jaar
Aantal volgers
157
Documenten
11126
Laatst verkocht
2 weken geleden

4.3

90 beoordelingen

5
57
4
17
3
7
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen