D320 / D 320 Study Material (Latest Update 2025 / 2026) Managing Cloud Security | Review Questions and Verified Answers | Grade A | 100% Correct - WGU
Question:
USPTO (United States Patent and Trademark Office)
Answer:
registers both patents and trademarks
Question:
NIST 800-145
Answer:
a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction
- / 4
Question:
NIST 800-146
Answer:
a guide that explains cloud technologies in "plain terms" to federal agencies and provides recommendations for IT decision makers.
Question:
ISO/IEC 17788:2014
Answer:
provides an overview of cloud computing along with a set of terms and definitions. It is a terminology foundation for cloud computing standards.
This Recommendation/International Standard is applicable to all types of organizations (e.g., commercial enterprises, government agencies, not-for- profit organizations).
Question:
NIST 500-292
Answer:
discusses how the adoption of cloud computing into the Federal Government and its implementation depend upon a variety of technical and non-technical factors
- / 4
Question:
ISO 31000:2009
Answer:
provides principles and generic guidelines on risk management.
can be applied throughout the life of an organization
can be used by any public, private or community enterprise, association, group or individual.
can be applied to any type of risk, whatever its nature, whether having positive or negative consequences
Question:
IEC 31010:2009
Answer:
This standard does not deal specifically with safety. It is a generic risk management standard and any references to safety are purely of an informative nature.
_____ provides guidance on selection and application of systematic techniques for risk assessment. This standard is not intended for certification, regulatory or contractual use.
- / 4
Question:
NIST SP 800-37 Revision 1
Answer:
offers a six-step process for implementing information security and risk management activities into a cohesive system development life cycle - for federal information systems
Question:
NIST 800-92
Answer:
Guide to Computer Security Log Management
Question:
NIST 800-40
Answer:
Guide for creating a Patch and Vulnerability Management Program
- / 4