WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
1. "Which phase of the cloud data lifecycle allows both Create
read and process functions to be performed?
(A) Share
(B) Store
(C) Create
(D) Archive"
2. "Which phase of the cloud data security lifecycle typi- Store
cally occurs simultaneously with creation?
(A) Use
(B) Share
(C) Store
(D) Destroy"
3. "Which phase of the cloud data life cycle uses content Share
delivery networks?
(A) Share
(B) Create
(C) Destroy
(D) Archive"
4. "Which phase of the cloud data life cycle is associated Destroy
with crypto-shredding?
(A) Use
(B) Store
(C) Share
(D) Destroy"
5. "Which cloud data storage architecture allows sen- Tokenization
sitive data to be replaced with unique identification
symbols that retain all the essential information about
the data without compromising its security?
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
(A) Obfuscation
(B) Tokenization
(C) Anonymization
(D) Randomization"
6. "Which methodology could cloud data storage utilize Whole-instance encryp-
to encrypt all data associated in an infrastructure as a tion
service (IaaS) deployment model?
(A) Sandbox encryption
(B) Client-side encryption
(C) Polymorphic encryption
(D) Whole-instance encryption"
7. "There is a threat to a banking cloud platform service. Structured
The developer needs to provide inclusion in a relation-
al database that is seamless and readily searchable by
search engine algorithms. Which platform as a service
(PaaS) data type should be used?
(A) Structured
(B) Unstructured
(C) Long-term storage
(D) Short-term storage"
8. "Which platform as a service (PaaS) storage architec- Object
ture should be used if an organization wants to store
presentations, documents, and audio files?
(A) Block
(B) Object
(C) Distributed
(D) Relational database"
9. "Which technique scrambles the content of data using Format-preserving en-
a mathematical algorithm while keeping the structur- cryption
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
al arrangement of the data?
(A) Tokenization
(B) Dynamic masking
(C) Proxy-based encryption
(D) Format-preserving encryption"
10. "Which encryption technique connects the instance to Proxy
the encryption instance that handles all crypto opera-
tions?
(A) Proxy
(B) Database
(C) Server-side
(D) Externally managed"
11. "Which type of control should be used to implement Application level
custom controls that safeguard data?
(A) Application level
(B) Management plane
(C) Options for access
(D) Public and internal sharing"
12. "Which element is protected by an encryption sys- Data
tem?
(A) Data
(B) Public key
(C) Ciphertext
(D) Management engine"
13. "A cloud administrator recommends using tokeniza- (B) The application stores
tion as an alternative to protecting data without en- the token
cryption. The administrator needs to make an autho-
rized application request to access the data.
Which step should occur immediately before this ac-
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
tion is taken?
(A) The application collects a token.
(B) The application stores the token.
(C) The tokenization server generates the token.
(D) The tokenization server returns the token to the
application."
14. "A company has recently defined classification levels Create
for its data. During which phase of the cloud data life
cycle should this definition occur?
(A) Use
(B) Share
(C) Create
(D) Archive"
15. "Which jurisdictional data protection includes dealing Privacy Regulation
with the international transfer of data?
(A) Privacy regulation
(B) Financial modernization
(C) Sarbanes-Oxley act (SOX)
(D) Secure choice authorization (SCA)"
16. "Which jurisdictional data protection controls the Gramm-Leach-Bliley act
ways that Financial institutions deal with the private (GLBA)
information of individuals?
(A) Sarbanes-Oxley act (SOX)
(B) Gramm-Leach-Bliley act (GLBA)
(C) Stored communications act (SCA)
(D) Health insurance portability and accountability act
(HIPAA)"
17. "Which jurisdictional data protection safeguards pro-
tected health information (PHI)?
Study online at https://quizlet.com/_6h0vjz
1. "Which phase of the cloud data lifecycle allows both Create
read and process functions to be performed?
(A) Share
(B) Store
(C) Create
(D) Archive"
2. "Which phase of the cloud data security lifecycle typi- Store
cally occurs simultaneously with creation?
(A) Use
(B) Share
(C) Store
(D) Destroy"
3. "Which phase of the cloud data life cycle uses content Share
delivery networks?
(A) Share
(B) Create
(C) Destroy
(D) Archive"
4. "Which phase of the cloud data life cycle is associated Destroy
with crypto-shredding?
(A) Use
(B) Store
(C) Share
(D) Destroy"
5. "Which cloud data storage architecture allows sen- Tokenization
sitive data to be replaced with unique identification
symbols that retain all the essential information about
the data without compromising its security?
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
(A) Obfuscation
(B) Tokenization
(C) Anonymization
(D) Randomization"
6. "Which methodology could cloud data storage utilize Whole-instance encryp-
to encrypt all data associated in an infrastructure as a tion
service (IaaS) deployment model?
(A) Sandbox encryption
(B) Client-side encryption
(C) Polymorphic encryption
(D) Whole-instance encryption"
7. "There is a threat to a banking cloud platform service. Structured
The developer needs to provide inclusion in a relation-
al database that is seamless and readily searchable by
search engine algorithms. Which platform as a service
(PaaS) data type should be used?
(A) Structured
(B) Unstructured
(C) Long-term storage
(D) Short-term storage"
8. "Which platform as a service (PaaS) storage architec- Object
ture should be used if an organization wants to store
presentations, documents, and audio files?
(A) Block
(B) Object
(C) Distributed
(D) Relational database"
9. "Which technique scrambles the content of data using Format-preserving en-
a mathematical algorithm while keeping the structur- cryption
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
al arrangement of the data?
(A) Tokenization
(B) Dynamic masking
(C) Proxy-based encryption
(D) Format-preserving encryption"
10. "Which encryption technique connects the instance to Proxy
the encryption instance that handles all crypto opera-
tions?
(A) Proxy
(B) Database
(C) Server-side
(D) Externally managed"
11. "Which type of control should be used to implement Application level
custom controls that safeguard data?
(A) Application level
(B) Management plane
(C) Options for access
(D) Public and internal sharing"
12. "Which element is protected by an encryption sys- Data
tem?
(A) Data
(B) Public key
(C) Ciphertext
(D) Management engine"
13. "A cloud administrator recommends using tokeniza- (B) The application stores
tion as an alternative to protecting data without en- the token
cryption. The administrator needs to make an autho-
rized application request to access the data.
Which step should occur immediately before this ac-
, WGU-C838-Pre-Assessment
Study online at https://quizlet.com/_6h0vjz
tion is taken?
(A) The application collects a token.
(B) The application stores the token.
(C) The tokenization server generates the token.
(D) The tokenization server returns the token to the
application."
14. "A company has recently defined classification levels Create
for its data. During which phase of the cloud data life
cycle should this definition occur?
(A) Use
(B) Share
(C) Create
(D) Archive"
15. "Which jurisdictional data protection includes dealing Privacy Regulation
with the international transfer of data?
(A) Privacy regulation
(B) Financial modernization
(C) Sarbanes-Oxley act (SOX)
(D) Secure choice authorization (SCA)"
16. "Which jurisdictional data protection controls the Gramm-Leach-Bliley act
ways that Financial institutions deal with the private (GLBA)
information of individuals?
(A) Sarbanes-Oxley act (SOX)
(B) Gramm-Leach-Bliley act (GLBA)
(C) Stored communications act (SCA)
(D) Health insurance portability and accountability act
(HIPAA)"
17. "Which jurisdictional data protection safeguards pro-
tected health information (PHI)?