Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU Course C838 - Managing Cloud Security (CCSP) Questions & ANSWERS (A+ GRADED 100% VERIFIED)| 2025/2026

Rating
-
Sold
-
Pages
158
Grade
A+
Uploaded on
07-12-2025
Written in
2025/2026

WGU Course C838 - Managing Cloud Security (CCSP) Questions & ANSWERS (A+ GRADED 100% VERIFIED)| 2025/2026

Institution
C838
Course
C838

Content preview

WGU Course C838 - Managing Cloud
Security (CCSP)
_______ drive security decisions.

A Public opinion
B Business requirements
C Surveys
D Customer service responses - ------------ANS: B


Which step should occur immediately before this action is taken?

A The tokenization server returns the token to the application.
B The tokenization server generates the token.
C The application collects a token.
D The application stores the token. - ------------ANS: D

A cloud customer is setting up communication paths with the cloud service provider
that will be used in the event of an incident.
Which action facilitates this type of communication?

A Incorporating checks on API calls
B Using existing open standards
C Identifying key risk indicators (KRIs)
D Performing a vulnerability assessment - ------------ANS: B

Which of the following statements is true of key management?

A Uses key management interoperability protocol to generate keys
B Includes generation of random number of keys
C Manages keys within an encryption engine
D Used in file-level encryption - ------------ANS: B

Which of the following supplemental security devices implements the DLP (data loss
prevention) security control?

A XML gateways
B API gateway
C Web application firewall
D Database activity monitoring - ------------ANS: A

,Which of the following techniques for ensuring cloud datacenter storage resiliency
uses encrypted chunks of data?

A RAID
B Data dispersion
C SAN
D Cloud-bursting - ------------ANS: B

Which of the following techniques for ensuring cloud datacenter storage resiliency
uses parity bits and disk striping?

A Cloud-bursting
B RAID
C Data dispersion
D SAN - ------------ANS: B


Which of the following technologies is used to ensure that secure API (Application
Programming Interface) access?

A Virtual private network
B Message-level crypto-access
C Data loss prevention
D ID.AM (Identity—Asset Management) - ------------ANS: B

Which of the following terms is not associated with cloud forensics?

A Analysis
B Plausibility
C Chain of custody
D eDiscovery - ------------ANS: B

Which of the following testing is referred to as white-box testing and is used to
determine the coding errors?

A DAST (Dynamic application security testing)
B RASP (Runtime application self-protection)
C Penetration testing
D SAST (Static application security testing) - ------------ANS: D

Which of the following threats is a form of cache poisoning in which forged data is
placed in the cache of the name server?

,A Data modification
B Footprinting
C Redirection
D Spoofing - ------------ANS: D

Which of the following threats occurs due to the loss of relevant encryption keys?

A Insider
B Service traffic hijacking
C Data loss
D Data breach - ------------ANS: C

Which of the following types of storage do cloud infrastructure services use?

A Structured
B Unstructured
C Content and file
D Volume - ------------ANS: D

Which of the following vulnerabilities exploits a user's browser to generate
unauthorized commands?

A Cross-site request forgery
B Cross-site scripting
C Sensitive data exposure
D Invalidated redirects and forwards - ------------ANS: A

Which of the following will help achieve redundancy in virtual switches?

Each correct answer represents a complete solution. Choose all that apply.

1) Kerberos
2) CHAP
3) Port channeling
4) Physical NICs

A 3,4
B 1,2 - ------------ANS: A

Which open web application security project (OWASP) Top 9 Coding Flaws leads to
security issues?

A Direct object reference
B Cross-site scripting

, C Denial-of-service
D Client-side injection - ------------ANS: A

Which option should an organization choose if there is a need to avoid software
ownership?

A Software as a service (SaaS)
B Platform as a service (PaaS)
C Containers as a service (CaaS)
D Infrastructure as a service (IaaS) - ------------ANS: A

Which organization focuses on enhancing the need to protect privacy using personal
data using a practical, risk-management-based approach?

A General Data Protection Regulation
B Asia-Pacific Economic Cooperation
C Organization for Economic Cooperation and Development
D EU data protection directive - ------------ANS: C

Which penalty is imposed for privacy violations under the general data protection
regulation (GDPR)?

A Penalty up to 2% of gross income
B Penalty up to 10 million Euros
C Penalty up to 5% of gross income
D Penalty up to 20 million Euros - ------------ANS: D

Which phase forms the security and foundation for IAM (Identity and Access
Management) within the cloud environment?

A Privileged user management
B Authentication and access management
C Provisioning and deprovisioning
D Centralized directory services - ------------ANS: B

Which phase of the cloud data life cycle allows both read and process functions to
be performed?

A Create
B Archive
C Store
D Share - ------------ANS: A

Which phase of the cloud data life cycle is associated with crypto-shredding?

Written for

Institution
C838
Course
C838

Document information

Uploaded on
December 7, 2025
Number of pages
158
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
gradepapers465
3.0
(1)

Get to know the seller

Seller avatar
gradepapers465 Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
9
Member since
9 months
Number of followers
0
Documents
960
Last sold
3 days ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions