Answers Graded A+
"Which phase of the cloud data lifecycle allows
both read and process functions to be "Which methodology could cloud data storage
performed? utilize to encrypt all data associated in an
(A) Share infrastructure as a service (IaaS) deployment
(B) Store model?
(C) Create (A) Sandbox encryption
(D) Archive" - ANSWER -Create (B) Client-side encryption
(C) Polymorphic encryption
(D) Whole-instance encryption" -
"Which phase of the cloud data security lifecycle ANSWER -Whole-instance encryption
typically occurs simultaneously with creation?
(A) Use
(B) Share "There is a threat to a banking cloud platform
(C) Store service. The developer needs to provide inclusion
(D) Destroy" - ANSWER -Store in a relational database that is seamless and
readily searchable by search engine algorithms.
Which platform as a service (PaaS) data type
"Which phase of the cloud data life cycle uses should be used?
content delivery networks? (A) Structured
(A) Share (B) Unstructured
(B) Create (C) Long-term storage
(C) Destroy (D) Short-term storage" - ANSWER -
(D) Archive" - ANSWER -Share Structured
"Which phase of the cloud data life cycle is "Which platform as a service (PaaS) storage
associated with crypto-shredding? architecture should be used if an organization
(A) Use wants to store presentations, documents, and
(B) Store audio files?
(C) Share (A) Block
(D) Destroy" - ANSWER -Destroy (B) Object
(C) Distributed
(D) Relational database" - ANSWER -
"Which cloud data storage architecture allows Object
sensitive data to be replaced with unique
identification symbols that retain all the essential
information about the data without compromising "Which technique scrambles the content of data
its security? using a mathematical algorithm while keeping the
(A) Obfuscation structural arrangement of the data?
(B) Tokenization (A) Tokenization
(C) Anonymization (B) Dynamic masking
(D) Randomization" - ANSWER - (C) Proxy-based encryption
Tokenization (D) Format-preserving encryption" -
ANSWER -Format-preserving encryption
, WGU-C838-Pre-Assessment Test Questions with Verified
Answers Graded A+
levels for its data. During which phase of the
cloud data life cycle should this definition occur?
"Which encryption technique connects the (A) Use
instance to the encryption instance that handles (B) Share
all crypto operations? (C) Create
(A) Proxy (D) Archive" - ANSWER -Create
(B) Database
(C) Server-side
(D) Externally managed" - ANSWER -Proxy "Which jurisdictional data protection includes
dealing with the international transfer of data?
(A) Privacy regulation
"Which type of control should be used to (B) Financial modernization
implement custom controls that safeguard data? (C) Sarbanes-Oxley act (SOX)
(A) Application level (D) Secure choice authorization (SCA)" -
(B) Management plane ANSWER -Privacy Regulation
(C) Options for access
(D) Public and internal sharing" -
ANSWER -Application level "Which jurisdictional data protection controls the
ways that Financial institutions deal with the
private information of individuals?
"Which element is protected by an encryption (A) Sarbanes-Oxley act (SOX)
system? (B) Gramm-Leach-Bliley act (GLBA)
(A) Data (C) Stored communications act (SCA)
(B) Public key (D) Health insurance portability and
(C) Ciphertext accountability act (HIPAA)" - ANSWER -
(D) Management engine" - ANSWER -Data Gramm-Leach-Bliley act (GLBA)
"A cloud administrator recommends using "Which jurisdictional data protection safeguards
tokenization as an alternative to protecting data protected health information (PHI)?
without encryption. The administrator needs to (A) Directive 95/46/EC
make an authorized application request to (B) Safe harbor regime
access the data. (C) Personal Data Protection Act of 2000
Which step should occur immediately before this (D) Health Insurance Portability and
action is taken? Accountability Act (HIPAA)" - ANSWER -
(A) The application collects a token. Health Insurance Portability and Accountability
(B) The application stores the token. Act (HIPAA)
(C) The tokenization server generates the token.
(D) The tokenization server returns the token to
the application." - ANSWER -(B) The "How is the compliance of the cloud service
application stores the token provider's legal and regulatory requirements
verified when securing personally identifiable
information (PII) data in the cloud?
"A company has recently defined classification (A) E-discovery process