{"id":113673,"date":"2023-08-16T03:07:14","date_gmt":"2023-08-16T03:07:14","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=113673"},"modified":"2023-08-16T03:07:16","modified_gmt":"2023-08-16T03:07:16","slug":"wgu-c838-managing-cloud-security-final-exam-oa-100-questions-and-answers-latest-2023-2024-agrade-2","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/08\/16\/wgu-c838-managing-cloud-security-final-exam-oa-100-questions-and-answers-latest-2023-2024-agrade-2\/","title":{"rendered":"WGU C838 MANAGING CLOUD SECURITY FINAL EXAM OA 100 QUESTIONS AND ANSWERS LATEST 2023-2024 |AGRADE"},"content":{"rendered":"\n<p>WGU C838 MANAGING CLOUD<br>SECURITY FINAL EXAM OA 100<br>QUESTIONS AND ANSWERS LATEST<br>2023-2024 |AGRADE<br>1) You are the security subject matter expert (SME) for an organization<br>considering a transition from the legacy environment into a hosted cloud provider<br>&#8216;s data center. One of the challenges you &#8216;re facing is whether the cloud provider<br>will be able to comply with the existing legislative and contractual frameworks<br>your organization is required to follow. This is a <strong><em>_<\/em><\/strong> issue.<br>a. Resiliency<br>b. Privacy<br>c. Performance<br>d. Regulatory &#8211; ANSWER- D<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>You are the security subject matter expert (SME) for an organization<br>considering a transition from the legacy environ ment into a hosted cloud provider<br>&#8216;s data center. One of the challenges you &#8216;re facing is whether the cloud provider<br>will be able to allow your organization to substantiate and determine with some<br>assurance that all of the contract terms are being met. This is a(n) <strong><em><strong>__<\/strong><\/em><\/strong><br>issue.<br>a. Regulatory<br>b. Privacy<br>c. Resiliency<br>d. Auditability &#8211; ANSWER- D<\/li>\n\n\n\n<li>Encryption is an essential tool for affording security to cloud-based operations.<br>While it is possible to encrypt every system, piece of data, and transaction that<br>takes place on the cloud, why might that not be the optimum choice for an<br>organization?<br>a. K ey length variances don &#8216;t provide any actual additional security.<br>b. It would cause additional processing overhead and time delay.<br>c. It might result in vendor lockout.<br>d. The data subjects might be upset by this. &#8211; ANSWER- B<\/li>\n\n\n\n<li>Encryption is an essential tool for affording security to cloud-based operations.<br>While it is possible to encrypt every system, piece of data, and transaction that<br>takes place on the cloud, why might that not be the optimum choice for an<br>organization?<br>a. It could increase the possibility of physical theft.<br>b. Encryption won &#8216;t work throughout the environment.<br>c. The protection might be disproportionate to the value of the asset(s).<br>d. Users will be able to see everything within the organization. &#8211; ANSWER- C<\/li>\n\n\n\n<li>Which of the following is not an element of the identification component of<br>identity and access management (IAM)?<br>a. Provisioning<br>b. Management<br>c. Discretion<br>d. Deprovisioning &#8211; ANSWER- C<\/li>\n\n\n\n<li>Which of the following entities is most likely to play a vital role in the identity<br>provisioning aspect of a user &#8216;s experience in an organization?<br>a. The accounting department<br>b. The human resources (HR) office<br>c. The maintenance team<br>d. The purchasing office &#8211; ANSWER- B<\/li>\n\n\n\n<li>Why is the deprovisioning element of the identification component of identity<br>and access management (IAM) so important?<br>a. Extra accounts cost so much extra money.<br>b. Open but unassigned accounts are vulnerabilities.<br>c. User tracking is essential to performance.<br>d. Encryption has to be maintained. &#8211; ANSWER- B<\/li>\n\n\n\n<li>All of the following are reasons to perform review and maintenance actions on<br>user accounts except <strong><em><strong>__<\/strong><\/em><\/strong>.<br>a. To determine whether the user still needs the same access<br>b. To determine whether the user is still with the organization<br>c. To determine whether the data set is still applicable to the user &#8216;s role<br>d. To determine whether the user is still performing well &#8211; ANSWER- D<\/li>\n\n\n\n<li>Who should be involved in review and maintenance of user accounts\/access?<br>a. The user &#8216;s manager<\/li>\n<\/ol>\n\n\n\n<p>b. The security manager<br>c. The accounting department<br>d. The incident response team &#8211; ANSWER- A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"10\">\n<li>Which of the following protocols is most applicable to the identification<br>process aspect of identity and access management (IAM)?<br>a. Secure Sockets Layer (SSL)<br>b. Internet Protocol security (IPsec)<br>c. Lightweight Directory Access Protocol (LDAP)<br>d. Amorphous ancillary data transmission (AADT) &#8211; ANSWER- C<\/li>\n\n\n\n<li>Privileged user (administrators, managers, and so forth) accounts need to be<br>reviewed more closely than basic user accounts. Why is this?<br>a. Privileged users have more encryption keys.<br>b. Regular users are more trustworthy.<br>c. There are extra controls on privileged user accounts.<br>d. Privileged users can cause more damage to the organization. &#8211; ANSWER- D<\/li>\n\n\n\n<li>The additional review activities that might be performed for privileged user<br>accounts could include all of the following except <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong>.<br>a. Deeper personnel background checks<br>b. Review of personal financial accounts for privileged users<br>c. More frequent reviews of the necessity for access<br>d. Pat-down checks of privileged users to deter against physical theft &#8211; ANSWERD<\/li>\n\n\n\n<li>If personal financial account reviews are performed as an additional review<br>control for privileged users, which of the following characteristics is least likely to<br>be a useful indicator for review purposes?<br>a. Too much money in the account<br>b. Too little money in the account<br>c. The bank branch being used by the privileged user<br>d. Specific senders\/recipients &#8211; ANSWER- C<\/li>\n\n\n\n<li>How often should the accounts of privileged users be reviewed?<br>a. Annually<br>b. Twice a year<br>c. Monthly<br>d. More often than regular user account reviews &#8211; ANSWER- D<\/li>\n\n\n\n<li>Privileged user account access should be <strong><em>__<\/em><\/strong>.<br>a. Temporary<br>b. Pervasive<br>c. Thorough<br>d. Granular &#8211; ANSWER- A<\/li>\n\n\n\n<li>The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of<br>common threats to organizations participating in cloud computing. According to<br>the CSA &#8216;s Notorious Nine list, data breaches can be <strong><em><strong>__<\/strong><\/em><\/strong>.<br>a. Overt or covert<br>b. International or subterranean<br>c. From internal or external sources<br>d. Voluminous or specific &#8211; ANSWER- C<\/li>\n\n\n\n<li>The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of<br>common threats to organizations participating in cloud computing. According to<br>the CSA, an organization that operates in the cloud environment and suffers a data<br>breach may be required to <strong><em>__<\/em><\/strong>.<br>a. Notify affected users<br>b. Reapply for cloud service<br>c. Scrub all affected physical memory<br>d. Change regulatory frameworks &#8211; ANSWER- A<\/li>\n\n\n\n<li>The Cloud Security Alliance (CSA) publishes the Notorious Nine, a list of<br>common threats to organizations participating in cloud computing. According to<br>the CSA, an organization that suffers a data breach might suffer all of the<br>following negative effects except <strong><em>__<\/em><\/strong>.<br>a. Cost of compliance with notification laws<br>b. Loss of public perception\/goodwill<br>c. Loss of market share<br>d. Cost of detection &#8211; ANSWER- D<\/li>\n\n\n\n<li>The Cloud Security Alliance (CSA) publishes, the Notorious Nine, a list of<br>common threats to organizations participating in cloud computing. According to<br>the CSA, in the event of a data breach, a cloud customer will likely need to comply<br>with all the following data breach notification requirements except <strong><em><strong>__<\/strong><\/em><\/strong>.<br>a. Multiple state laws<br>b. Contractual notification requirements<br>c. All standards-based notification schemes<br>d. Any applicable federal regulations &#8211; ANSWER- C<br><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>WGU C838 MANAGING CLOUDSECURITY FINAL EXAM OA 100QUESTIONS AND ANSWERS LATEST2023-2024 |AGRADE1) You are the security subject matter expert (SME) for an organizationconsidering a transition from the legacy environment into a hosted cloud provider&#8216;s data center. One of the challenges you &#8216;re facing is whether the cloud providerwill be able to comply with the existing [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-113673","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=113673"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/113673\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=113673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=113673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=113673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}