WGU PA D320 Questions and Answers
Questions in this set (80)
Which phase of the cloud data Share
life cycle requires adherence to
export and import restrictions,
including Export Administration
Regulations (EAR) and the
Wassenaar Arrangement?
Creat
e
Shar
e Use
Destr
oy
Why is the striping method of It allows efficient data recovery as even if one drive fails, other
storing data used in most drives fill in the missing data.
redundant array of independent
disks (RAID) configurations?
It prevents outages and
attacks from occurring in a
cloud environment.
It prevents data from being
recovered once it is destroyed
using crypto- shredding.
It allows data to be safely
distributed and stored in a
common centralized location.
It allows efficient data recovery
as even if one drive fails, other
drives fill in the missing data.
,What is the purpose of egress They are used to prevent data from going outside the control of an
monitoring tools? organization.
They are used to convert a
given set of data or information
into a different value. They are
used to prevent data from going
outside the control of an
organization.
They are used to create data
during the Create phase of the
cloud data life cycle. They are
used to remove data during
the Destroy phase of the cloud
data life cycle.
A company is looking at Ephemeral
different types of cloud storage
options. One of the threats to
cloud storage that the
company foresees is the
possibility of losing forensic
artifacts in the event of an
incident response
investigation.
Which type of cloud storage
has the highest risk of losing
forensic artifacts in the event of
an incident response
investigation?
File-
based
Long-
term
Block
Epheme
ral
A manager is made aware of a Privacy notice
customer complaint about how
an application developed by
the company collects personal
and environmental information
from the devices it is installed
on.
Which document should the
manager refer to in order to
determine if the company has
, properly disclosed information
about what data it collects from
this application's users?
Retention
policy Breach
notification
Privacy
notice Denial
of service
An organization needs to store Hashing
passwords in a database
securely. The data should not be
available to system
administrators.
Which technique should the
organization use?
Encryption
Hashing
Encoding
Masking
Questions in this set (80)
Which phase of the cloud data Share
life cycle requires adherence to
export and import restrictions,
including Export Administration
Regulations (EAR) and the
Wassenaar Arrangement?
Creat
e
Shar
e Use
Destr
oy
Why is the striping method of It allows efficient data recovery as even if one drive fails, other
storing data used in most drives fill in the missing data.
redundant array of independent
disks (RAID) configurations?
It prevents outages and
attacks from occurring in a
cloud environment.
It prevents data from being
recovered once it is destroyed
using crypto- shredding.
It allows data to be safely
distributed and stored in a
common centralized location.
It allows efficient data recovery
as even if one drive fails, other
drives fill in the missing data.
,What is the purpose of egress They are used to prevent data from going outside the control of an
monitoring tools? organization.
They are used to convert a
given set of data or information
into a different value. They are
used to prevent data from going
outside the control of an
organization.
They are used to create data
during the Create phase of the
cloud data life cycle. They are
used to remove data during
the Destroy phase of the cloud
data life cycle.
A company is looking at Ephemeral
different types of cloud storage
options. One of the threats to
cloud storage that the
company foresees is the
possibility of losing forensic
artifacts in the event of an
incident response
investigation.
Which type of cloud storage
has the highest risk of losing
forensic artifacts in the event of
an incident response
investigation?
File-
based
Long-
term
Block
Epheme
ral
A manager is made aware of a Privacy notice
customer complaint about how
an application developed by
the company collects personal
and environmental information
from the devices it is installed
on.
Which document should the
manager refer to in order to
determine if the company has
, properly disclosed information
about what data it collects from
this application's users?
Retention
policy Breach
notification
Privacy
notice Denial
of service
An organization needs to store Hashing
passwords in a database
securely. The data should not be
available to system
administrators.
Which technique should the
organization use?
Encryption
Hashing
Encoding
Masking