Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU D320 PRACTICE EXAM QUESTIONS WITH 100% CORRECT ANSWERS || LATEST VERSION 2025/2026 WITH EXPERT VERIFIED SOLUTIONS || ASSURED PASS

Beoordeling
-
Verkocht
-
Pagina's
51
Cijfer
A+
Geüpload op
18-05-2026
Geschreven in
2025/2026

WGU D320 PRACTICE EXAM QUESTIONS WITH 100% CORRECT ANSWERS || LATEST VERSION 2025/2026 WITH EXPERT VERIFIED SOLUTIONS || ASSURED PASS. 1: Which phase of the cloud data lifecycle is most likely to overlap with the 'Create' phase in terms of implementing security controls A. Share B. Store C. Use D. Destroy - ANSWER: B. Store Explanation: • Store often overlaps with the Create phase because as soon as data is created, it usually needs to be securely stored. Security controls, such as encryption, should be implemented at this stage. • Share and Use happen after data is stored. • Destroy is the final stage in the lifecycle and typically occurs after data is no longer needed. 2: Implements Operations What is the primary goal of implementing a Disaster Recovery Plan (DRP) in cloud operations A. Ensure high availability of cloud services B. Recover operations after a catastrophic event C. Perform routine backups of data D. Prevent unauthorized access to cloud resources 2 | P a g e - ANSWER: B. Recover operations after a catastrophic event Explanation: The main goal of a Disaster Recovery Plan is to recover business operations as quickly as possible after a catastrophic event. High availability is a separate concern, focusing on maintaining operations, while backups are part of DRP but not the primary goal. Preventing unauthorized access is a security concern, not specifically related to DRP. 1: Implements Secure Solutions Which technology is most effective in preventing unauthorized access to sensitive data by ensuring it is unreadable without proper decryption keys A. Data Masking B. Tokenization C. Encryption D. Obfuscation - ANSWER: C. Encryption Explanation: Encryption transforms readable data into an unreadable format using cryptographic algorithms, making it inaccessible to unauthorized users. Tokenization and data masking are also methods of protecting data, but they do not provide the same level of security as encryption. Obfuscation is the process of making data more difficult to understand but is not intended to prevent access. 2: Implements Operations Which of the following activities is essential during the Secure Operations phase of the Software Development Lifecycle (SDLC) A. Static Analysis B. Code Review C. Dynamic Analysis D. Acceptance Testing 3 | P a g e - ANSWER: C. Dynamic Analysis Explanation: Dynamic Analysis is crucial during the secure operations phase because it involves testing the software in a runtime environment, identifying security vulnerabilities that might only become apparent during execution. Static Analysis and Code Review are performed earlier in the SDLC, and Acceptance Testing is typically done after secure operations to verify the system meets the requirements. Implements Secure Solutions Which technology should be implemented to ensure secure communication between on-site enterprise systems and a cloud platform A. Domain Name System Security Extensions (DNSSEC) B. Internet Protocol Security (IPSec) VPN C. Web Application Firewall (WAF) D. Data Loss Prevention (DLP) - ANSWER: B. Internet Protocol Security (IPSec) VPN Explanation: • IPSec VPN is designed to secure communication over an IP network. It encrypts the entire IP packet for secure transmission between on-site systems and cloud platforms, ensuring data integrity and confidentiality. • DNSSEC ensures the integrity of DNS responses but doesn't provide secure communication between systems. • WAF protects web applications by filtering and monitoring HTTP traffic but is not used for secure communication between systems. • DLP prevents data breaches by monitoring and controlling data flows, but it doesn't establish secure communication channels. 4 | P a g e 3: Conducts Risk Management Which risk management approach involves the transfer of risk to another party, such as through insurance A. Risk Mitigation B. Risk Avoidance C. Risk Transference D. Risk Acceptance - ANSWER: C. Risk Transference Explanation: Risk Transference involves shifting the impact of a risk to a third party, often by using insurance or outsourcing certain activities. Risk Mitigation involves reducing the risk, Risk Avoidance involves eliminating the risk, and Risk Acceptance involves acknowledging and accepting the risk without further action. 4: Identifies Legal, Compliance, and Ethical Concerns Which U.S. law focuses specifically on the protection of personal health information A. Sarbanes-Oxley Act (SOX) B. Health Insurance Portability and Accountability Act (HIPAA) C. Gramm-Leach-Bliley Act (GLBA) D. Federal Information Security Management Act (FISMA) - ANSWER: B. Health Insurance Portability and Accountability Act (HIPAA) Explanation: HIPAA sets standards for the protection of personal health information. SOX is related to corporate financial practices, GLBA focuses on financial privacy, and FISMA applies to federal information security management. 5: Implements Secure Solutions Which cloud service model requires the customer to manage the security of the operating system, applications, and data A. Software as a Service (SaaS)

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

1|Page




WGU D320 PRACTICE EXAM QUESTIONS
WITH 100% CORRECT ANSWERS || LATEST
VERSION 2025/2026 WITH EXPERT VERIFIED
SOLUTIONS || ASSURED PASS


1: Which phase of the cloud data lifecycle is most likely to overlap with the
'Create' phase in terms of implementing security controls A. Share
B. Store
C. Use
D. Destroy
- ANSWER: B. Store Explanation:
• Store often overlaps with the Create phase because as soon as data is created, it
usually needs to be securely stored. Security controls, such as encryption, should
be implemented at this stage.
• Share and Use happen after data is stored.
• Destroy is the final stage in the lifecycle and typically occurs after data is no
longer needed.


2: Implements Operations
What is the primary goal of implementing a Disaster Recovery Plan (DRP) in
cloud operations A. Ensure high availability of cloud services
B. Recover operations after a catastrophic event
C. Perform routine backups of data
D. Prevent unauthorized access to cloud resources

,2|Page




- ANSWER: B. Recover operations after a catastrophic event
Explanation: The main goal of a Disaster Recovery Plan is to recover business
operations as quickly as possible after a catastrophic event. High availability is a
separate concern, focusing on maintaining operations, while backups are part of
DRP but not the primary goal. Preventing unauthorized access is a security
concern, not specifically related to DRP.




1: Implements Secure Solutions
Which technology is most effective in preventing unauthorized access to sensitive
data by ensuring it is unreadable without proper decryption keys A. Data Masking
B. Tokenization
C. Encryption
D. Obfuscation
- ANSWER: C. Encryption
Explanation: Encryption transforms readable data into an unreadable format using
cryptographic algorithms, making it inaccessible to unauthorized users.
Tokenization and data masking are also methods of protecting data, but they do not
provide the same level of security as encryption. Obfuscation is the process of
making data more difficult to understand but is not intended to prevent access.


2: Implements Operations
Which of the following activities is essential during the Secure Operations phase of
the Software Development Lifecycle (SDLC) A. Static Analysis
B. Code Review
C. Dynamic Analysis
D. Acceptance Testing

,3|Page




- ANSWER: C. Dynamic Analysis
Explanation: Dynamic Analysis is crucial during the secure operations phase
because it involves testing the software in a runtime environment, identifying
security vulnerabilities that might only become apparent during execution. Static
Analysis and Code Review are performed earlier in the SDLC, and Acceptance
Testing is typically done after secure operations to verify the system meets the
requirements.


Implements Secure Solutions
Which technology should be implemented to ensure secure communication
between on-site enterprise systems and a cloud platform A. Domain Name System
Security Extensions (DNSSEC)
B. Internet Protocol Security (IPSec) VPN
C. Web Application Firewall (WAF)
D. Data Loss Prevention (DLP)
- ANSWER: B. Internet Protocol Security (IPSec) VPN
Explanation:
• IPSec VPN is designed to secure communication over an IP network. It
encrypts the entire IP packet for secure transmission between on-site systems and
cloud platforms, ensuring data integrity and confidentiality.

• DNSSEC ensures the integrity of DNS responses but doesn't provide secure
communication between systems.
• WAF protects web applications by filtering and monitoring HTTP traffic but
is not used for secure communication between systems.

• DLP prevents data breaches by monitoring and controlling data flows, but it
doesn't establish secure communication channels.

, 4|Page




3: Conducts Risk Management
Which risk management approach involves the transfer of risk to another party,
such as through insurance A. Risk Mitigation
B. Risk Avoidance
C. Risk Transference
D. Risk Acceptance
- ANSWER: C. Risk Transference
Explanation: Risk Transference involves shifting the impact of a risk to a third
party, often by using insurance or outsourcing certain activities. Risk Mitigation
involves reducing the risk, Risk Avoidance involves eliminating the risk, and Risk
Acceptance involves acknowledging and accepting the risk without further action.


4: Identifies Legal, Compliance, and Ethical Concerns
Which U.S. law focuses specifically on the protection of personal health
information A. Sarbanes-Oxley Act (SOX)
B. Health Insurance Portability and Accountability Act (HIPAA)
C. Gramm-Leach-Bliley Act (GLBA)
D. Federal Information Security Management Act (FISMA)
- ANSWER: B. Health Insurance Portability and Accountability Act (HIPAA)
Explanation: HIPAA sets standards for the protection of personal health
information. SOX is related to corporate financial practices, GLBA focuses on
financial privacy, and FISMA applies to federal information security management.
5: Implements Secure Solutions
Which cloud service model requires the customer to manage the security of the
operating system, applications, and data A. Software as a Service (SaaS)

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
18 mei 2026
Aantal pagina's
51
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
DRBRIGHT2026 Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
931
Lid sinds
3 jaar
Aantal volgers
696
Documenten
5683
Laatst verkocht
14 uur geleden
ALPHA STUDY CENTRE.

Alpha Academy is a dedicated study centre where you will find QUALITY & RELIABLE study resources that will help you prepare, revise and pass your examinations for all majors and modules in real TIME.. Good Luck from ALPHA ACADEMY.

3.7

184 beoordelingen

5
95
4
25
3
19
2
7
1
38

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen