Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

WGU - Managing Cloud Security - C838| Actual questions and answers 2023/24

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
15-10-2023
Geschreven in
2023/2024

WGU - Managing Cloud Security - C838| Actual questions and answers 2023/24 What are the 4 characteristics of cloud computing? - Broad network access On-demand services Resource Pooling Measured or "metered" service What NIST publication number defines cloud computing? - 800-145 What ISO/IEC standard provides information on cloud computing? - 17788 What is another way of describing a functional business requirement? - necessary What is another way of describing a nonfunctional business requirement? - not necessary What is the greatest driver pushing orgs to the cloud? - Cost savings What is cloud bursting? - Ability to increase available cloud resources on demand What are 3 characteristics of cloud computing? - Elasticity Simplicity Scalability What is a cloud customer? - Anyone purchasing cloud services What is a cloud user? - Anyone using cloud services What are the three cloud computing service models? - SaaS(Software as a service) PaaS(Platform as a service) IaaS(Infrastructure as a service) What is IaaS (Infrastructure as a Service)? - Cloud provider provides all the physical capability and administration, while the customer is responsible for logical resources. What is PaaS (Platform as a Service)? - A cloud computing service that provides the hardware and the operating system and is responsible for updating and maintaining both. What is SaaS (Software As A Service)? - Cloud provider manages everything. What are the four cloud deployment models? - Public Private Community Hybrid What cloud model is owned by a single organization? - Private What cloud model is an arrangement of two or more cloud servers? - Hybrid What cloud model is a shared setup between orgs? - Community What cloud model is open for free usage? - Public What is a cloud service provider? - Cloud service provider manages and provides entire hosting ability What is a Cloud Access Security Broker? - Third-party acting as an intermediary for identity and access management What do regulators do? - Ensure organizations are in compliance with regulatory framework. What word in the CIA triad describes: What protects information from unauthorized access/dissemination? - Confidentiality What word in the CIA triad describes: Ensuring that information is not subject to unauthorized modification? - Integrity What word in the CIA triad describes: Ensuring that authorized users can access the information when they are permitted to do so? - Availability What is a cloud architect? - Expert in cloud computing What is cloud os also known as? - PaaS NIST standard number that lists accredited and outmoded cryptosystems - FIPS 140-2 customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or non-technical constraints. - vendor lock-m What is cloud migration? - Process of transitioning part of a company's data or services from onsite premises to the cloud What is cloud portability? - Move applications and data between cloud providers What offers a degree of assurance that nobody w/o authorization will be able to access other's data? - Encryption If a cloud customer wants a secure, isolated sandbox in order to conduct software development and testing, which cloud service model would probably be best? - PaaS What technology has NOT made cloud service viable? - Smart hubs What determines the critical paths, processes, and assets of an organization? - BIA Fully-operational environment with very little maintenance or administration necessary, which cloud service model would probably be best? - PaaS customer is unable to recover or access their own data due to the cloud provider going into bankruptcy or otherwise leaving the market. - Vendor lock-out What are four examples of things to know to decide how to handle risks within an org? - Inventory of all assets Valuation of each asset Critical paths, processes, and assets Clear understanding of risk appetite T/F: Assets are only tangible items. - False. Assets are everything owned or controlled by an org. The process of evaluating assets? - Business Impact Analysis(BIA) What is criticality? - Something an org could not operate or exist without What are 5 examples of criticality for an org - Tangible assets Intangible assets Processes Data paths Personnel In risk, what is the avoidance method? - Avoiding high risk In risk, what is the acceptance method? - Acceptable level of risk In risk, what is an example of the avoidance method? - Insurance In risk, what is the mitigation method? - Controls or countermeasures Assets can be what? - Tangible Intangible Personnel What does Business Impact Analysis do? - Defines which of the assets provide the intrinsic value of an organization. What is risk appetite - Level, Amount, or Type of risk that an org finds acceptable What is the IaaS boundary? - The provider is responsible for connectivity and power and the customer is in charge for installation of software. What is the PaaS boundary? - The provider is responsible for updates and administration of the OS and the customer monitors and reviews software events. What is the SaaS boundary? - The provider is responsible for system maintenance and the customer supplies and processes data to and in the system. What should encryption be used for in a cloud datacenter? - Long-term storage/archiving Protecting near-term stored files, such as snapshots of virtualized instances Preventing unauthorized access to specific datasets by authorized personnel What should encryption be used for in communications between cloud providers and users? - Creating secure sessions Ensuring the integrity and confidentiality of data in transit What are 4 controls/mechanisms a cloud provider should play a role in in layered defense? - Strong personnel controls Technological controls Physical controls Governance mechanisms In cloud layered defense what are examples of personnel controls? - background checks continual monitoring In cloud layered defense what are examples of technological controls? - encryption event logging access control enforcement In cloud layered defense what is an examples of physical controls? - access to overall campus In cloud layered defense what is an example of governance mechanisms? - auditing What are ways for securing devices in a datacenter? - Guess accounts removed no default passwords systems are patched, maintained and updated unused ports are closed limited physical access What is layered defense? - The practice of having multiple overlapping means of securing the environment with a variety of methods Who determines risk appetite? - senior management Experimental technology of processing encrypted data w/o decrypting it first? - Homomorphic T/F: Data owners remain legally responsible for all data they own - True What are four ways an org might categorize data? - Regulatory compliance business function function unit by project What are three examples of classification? - sensitivity jurisdiction criticality What is a data owner? - Collects or creates the data, and possesses the rights and responsibilities of the data What is a data custodian? - Manipulates, stores, or moves the data, and serves as a cloud provider What is datamining? - Data mining tries to automatically find interesting patterns in data using plethora of technologies What method would an org creates categories based on which rules apply to a specific dataset? - regulatory compliance What method would an org have specific categories for different uses of data? - business function What would a department or office be called that has its own category and keeps all the data it controls? - functional unit what dataset is defined by projects? - by project What data discovery method is used when the discovery effort is considered in response to a mandate with a specific purpose? - Label-based What data discovery method is used to collect all matching data elements for a certain purpose - Metedata-based What data discovery method is used to locate and identify specific kinds of data by delving into the datasets? - Content-based What data discovery method is used to create new data feeds from sets of data already existing within the environment? - data analytics T/F: Being in the cloud means organization may not be subject to many legal constructs simultaneously. - False T/F: Awareness and compliance with specific jurisdictions are challenges of cloud computing. - True T/F: Cloud user is responsible for managing virtualized images, stored data, and operational data. - False T/F: Cloud user is unaware about that where the data is exactly present at the moment in terms of both datacenters and geographic locations. - True What are four examples of Fair Use under copyright laws? - Academic Critique News Reporting

Meer zien Lees minder
Instelling
WGU - Managing Cloud Security - C838
Vak
WGU - Managing Cloud Security - C838










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU - Managing Cloud Security - C838
Vak
WGU - Managing Cloud Security - C838

Documentinformatie

Geüpload op
15 oktober 2023
Aantal pagina's
22
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
STUVEX NURSING
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
803
Lid sinds
2 jaar
Aantal volgers
315
Documenten
16222
Laatst verkocht
2 dagen geleden
STUVATE - STUVIA USA

My store is a comprehensive destination for buying and selling a variety of documents. we offer a vast range of documents that cater to different needs and requirements, our documents are well-researched, accurate, and of high quality, ensuring customer satisfaction. whether you are looking for legal documents, academic papers, business reports or miscellaneous documents we`ve got you covered.

3.8

124 beoordelingen

5
49
4
32
3
24
2
7
1
12

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen