Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

C838- MANAGING CLOUD SECURITY(WGU) COMPLETE QUESTIONS AND CORRECT ANSWERS ||A+ GRADED

Rating
-
Sold
-
Pages
53
Grade
A+
Uploaded on
11-02-2025
Written in
2024/2025

C838- MANAGING CLOUD SECURITY(WGU) COMPLETE QUESTIONS AND CORRECT ANSWERS ||A+ GRADED 1. Assets can be what? - ANSWER Tangible Intangible Personnel 2. What is white box testing? - ANSWER The tester is using knowledge of the program's internals. 3. What is black box testing? - ANSWER The tester is testing without knowledge of the internals. 4. What are 4 cloud application assurance and validation methods? - ANSWER Approved APIs Secure code reviews runtime application self-protection securing open source software 5. What allows applications to consume web services from the application, to expand its capabilities? - ANSWER approved APIs 6. What identifies and mitigates codes in an application that has exposed a potential vulnerability? - ANSWER secure code reviews 1 7. What protects itself without human intervention and assists in the prevention of successful attack? - ANSWER runtime application self-protection 8. What allows users to make modifications that they choose in order to add or enhance the functionality? - ANSWER securing open source software 9. What cloud model removes and reduces the authority and execution of security controls in the environment - ANSWER deployment model 10. What is SAML - ANSWER A standard for exchanging authentication and authorization data between security domains 11. What is the most widely used federation standard? - ANSWER Security Assertion Markup Language(SAML) 12. What is an API? - ANSWER A set of routines, standards, protocols, and tools for building software applications to access a web-based software application or tool 13. What is SAST? - ANSWER A set of technologies that analyze application source code, byte code, and binaries for coding and design problems that would indicate a security problem or vulnerability 14. What is ONF? - ANSWER A framework of containers for all components of application security, best practices, catalogued and leveraged by the organization 15. What is data masking? - ANSWER A method for creating similar but inauthentic datasets used for software testing and user 2 training. 16. What does Business Impact Analysis do? - ANSWER Defines which of the assets provide the intrinsic value of an organization. 17. What is risk appetite - ANSWER Level, Amount, or Type of risk that an org finds acceptable 18. What is the IaaS boundary? - ANSWER The provider is responsible for connectivity and power and the customer is in charge for installation of software. 19. What is the PaaS boundary? - ANSWER The provider is responsible for updates and administration of the OS and the customer monitors and reviews software events. 20. What is the SaaS boundary? - ANSWER The provider is responsible for system maintenance and the customer supplies and processes data to and in the system. 21. What should encryption be used for in a cloud datacenter? - ANSWER Long-term storage/archiving Protecting near-term stored files, such as snapshots of virtualized instances Preventing unauthorized access to specific datasets by authorized personnel 22. What should encryption be used for in communications between cloud providers and users? - ANSWER Creating secure sessions Ensuring the integrity and confidentiality of data in transit 3 23. What are 4 controls/mechanisms a cloud provider should play a role in in layered defense? - ANSWER Strong personnel controls Technological controls Physical controls Governance mechanisms 24. In cloud layered defense what are examples of personnel controls? - ANSWER background checks continual monitoring 25. What are the 4 characteristics of cloud computing? - ANSWER Broad network access On-demand services Resource Pooling Measured or "metered" service 26. What NIST publication number defines cloud computing? - ANSWER 800-145 27. What ISO/IEC standard provides information on cloud computing? - ANSWER 17788 28. What is another way of describing a functional business requirement? - ANSWER necessary 29. What is another way of describing a nonfunctional business requirement? - ANSWER not necessary 30. What is the greatest driver pushing orgs to the cloud? - ANSWER Cost savings 31. What is cloud bursting? - ANSWER Ability to increase 4 available cloud resources on demand 32. What are 3 characteristics of cloud computing? - ANSWER Elasticity Simplicity Scalability 33. What is a cloud customer? - ANSWER Anyone purchasing cloud services 34. What is a cloud user? - ANSWER Anyone using cloud services 35. What are the three cloud computing service models? - ANSWER SaaS(Software as a service) PaaS(Platform as a service) IaaS(Infrastructure as a service) 36. What is IaaS (Infrastructure as a Service)? - ANSWER Cloud provider provides all the physical capability and administration, while the customer is responsible for logical resources. 37. What is PaaS (Platform as a Service)? - ANSWER A cloud computing service that provides the hardware and the operating system and is responsible for updating and maintaining both. 38. What is SaaS (Software As A Service)? - ANSWER Cloud provider manages everything. 39. What are the four cloud deployment models? - ANSWER Public Private 5 Community Hybrid 40. What cloud model is owned by a single organization? - ANSWER Private 41. What cloud model is an arrangement of two or more cloud servers? - ANSWER Hybrid 42. What cloud model is a shared setup between orgs? - ANSWER Community 43. What cloud model is open for free usage? - ANSWER Public 44. What is a cloud service provider? - ANSWER Cloud service provider manages and provides entire hosting ability 45. What is a Cloud Access Security Broker? - ANSWER Third-party acting as an intermediary for identity and access management 46. What do regulators do? - ANSWER Ensure organizations are in compliance with regulatory framework. 47. What word in the CIA triad describes: What protects information from unauthorized access/dissemination? - ANSWER Confidentiality 48. What word in the CIA triad describes: Ensuring that information is not subject to unauthorized modification? - ANSWER Integrity 6 49. What word in the CIA triad describes: Ensuring that authorized users can access the information when they are permitted to do so? - ANSWER Availability 50. What is a cloud architect? - ANSWER Expert in cloud computing 51. What is cloud os also known as? - ANSWER PaaS 52. NIST standard number that lists accredited and outmoded cryptosystems - ANSWER FIPS 140-2 53. customer may be unable to leave, migrate, or transfer to an alternate provider due to technical or non-technical constraints. - ANSWER vendor lock-m 54. What is cloud migration? - ANSWER Process of transitioning part of a company's data or services from onsite premises to the cloud 55. What is cloud portability? - ANSWER Move applications and data between cloud providers 56. What offers a degree of assurance that nobody w/o authorization will be able to access other's data? - ANSWER Encryption 57. If a cloud customer wants a secure, isolated sandbox in order to conduct software development and testing, which cloud service model would probably be best? - ANSWER PaaS 58. What technology has NOT made cloud service viable? - ANSWER Smart hubs

Show more Read less
Institution
C838 WGU
Course
C838 WGU

Content preview

C838- MANAGING CLOUD
SECURITY(WGU) COMPLETE
QUESTIONS AND CORRECT
ANSWERS ||A+ GRADED
1. Assets can be what? - ANSWER ✅Tangible
Intangible
Personnel

2. What is white box testing? - ANSWER ✅The tester is using
knowledge of the program's internals.

3. What is black box testing? - ANSWER ✅The tester is testing
without knowledge of the internals.

4. What are 4 cloud application assurance and validation
methods? - ANSWER ✅Approved APIs
Secure code reviews
runtime application self-protection
securing open source software

5. What allows applications to consume web services from the
application, to expand its capabilities? - ANSWER ✅approved
APIs

6. What identifies and mitigates codes in an application that has
exposed a potential vulnerability? - ANSWER ✅secure code
reviews

1

, 7. What protects itself without human intervention and assists in
the prevention of successful attack? - ANSWER ✅runtime
application self-protection

8. What allows users to make modifications that they choose in
order to add or enhance the functionality? - ANSWER ✅securing
open source software

9. What cloud model removes and reduces the authority and
execution of security controls in the environment - ANSWER
✅deployment model

10. What is SAML - ANSWER ✅A standard for exchanging
authentication and authorization data between security domains

11. What is the most widely used federation standard? - ANSWER
✅Security Assertion Markup Language(SAML)

12. What is an API? - ANSWER ✅A set of routines, standards,
protocols, and tools for building software applications to access a
web-based software application or tool

13. What is SAST? - ANSWER ✅A set of technologies that
analyze application source code, byte code, and binaries for coding
and design problems that would indicate a security problem or
vulnerability

14. What is ONF? - ANSWER ✅A framework of containers for
all components of application security, best practices, catalogued
and leveraged by the organization

15. What is data masking? - ANSWER ✅A method for creating
similar but inauthentic datasets used for software testing and user
2

,training.

16. What does Business Impact Analysis do? - ANSWER
✅Defines which of the assets provide the intrinsic value of an
organization.

17. What is risk appetite - ANSWER ✅Level, Amount, or Type of
risk that an org finds acceptable

18. What is the IaaS boundary? - ANSWER ✅The provider is
responsible for connectivity and power and the customer is in
charge for installation of software.

19. What is the PaaS boundary? - ANSWER ✅The provider is
responsible for updates and administration of the OS and the
customer monitors and reviews software events.

20. What is the SaaS boundary? - ANSWER ✅The provider is
responsible for system maintenance and the customer supplies and
processes data to and in the system.

21. What should encryption be used for in a cloud datacenter? -
ANSWER ✅Long-term storage/archiving
Protecting near-term stored files, such as snapshots of virtualized
instances
Preventing unauthorized access to specific datasets by authorized
personnel

22. What should encryption be used for in communications
between cloud providers and users? - ANSWER ✅Creating secure
sessions
Ensuring the integrity and confidentiality of data in transit


3

, 23. What are 4 controls/mechanisms a cloud provider should play
a role in in layered defense? - ANSWER ✅Strong personnel
controls
Technological controls
Physical controls
Governance mechanisms

24. In cloud layered defense what are examples of personnel
controls? - ANSWER ✅background checks
continual monitoring

25. What are the 4 characteristics of cloud computing? - ANSWER
✅Broad network access
On-demand services
Resource Pooling
Measured or "metered" service

26. What NIST publication number defines cloud computing? -
ANSWER ✅800-145

27. What ISO/IEC standard provides information on cloud
computing? - ANSWER ✅17788

28. What is another way of describing a functional business
requirement? - ANSWER ✅necessary

29. What is another way of describing a nonfunctional business
requirement? - ANSWER ✅not necessary

30. What is the greatest driver pushing orgs to the cloud? -
ANSWER ✅Cost savings

31. What is cloud bursting? - ANSWER ✅Ability to increase
4

Written for

Institution
C838 WGU
Course
C838 WGU

Document information

Uploaded on
February 11, 2025
Number of pages
53
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SmartscoreAaron Chicago State University
Follow You need to be logged in order to follow users or courses
Sold
77
Member since
1 year
Number of followers
6
Documents
4009
Last sold
3 days ago
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.1

7 reviews

5
3
4
1
3
0
2
0
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions